Re: are unattended updates a good idea?

2015-02-01 Thread Will Aoki
On Sat, Jan 31, 2015 at 09:58:39AM +0100, Ml Ml wrote: > Is anyone else facing the same problem? What are your experiences > doing (blind) automatic security updates. I've done automatic updates for Debian under cfengine control for nine years and Ubuntu for perhaps one and a half. I started with

Re: Create Logical Volumes within an encrypted VG

2011-04-01 Thread Will Aoki
On Fri, Apr 01, 2011 at 11:53:48AM -0300, Rafael Moraes wrote: > *#pvdisplay* > --- Physical volume --- > PV Name /dev/dm-0 > VG Name vg01 > PV Size 148.79 GiB / not usable 1.29 MiB This: > Allocatable NO is your problem: allocation of phy

Re: About how to protect network resources in LDAP environment?

2010-08-27 Thread Will Twomey
In /etc/exports, add "no_root_squash" For example: /home 192.168.0.0/24(rw,no_root_squash) On Fri, Aug 27, 2010 at 11:06 AM, Min Wang wrote: > Hi Security Gurus: > > I have following set up: > > Multiple Linux PCs use OpenLdap to authenicate, and mount /home to NFS > server > > The goals are: >

Re: sendmail & localhost rDNS

2009-08-12 Thread Will Aoki
On Tue, Aug 11, 2009 at 10:56:57AM +0200, Joerg Morbitzer wrote: > I just did a fresh sendmail installation on Debian Etch getting this > auto-generated new /etc/mail/access file: > > titan:~# grep "^Connect:.*RELAY" /etc/mail/access > Connect:localhost RELAY > Connect:127

Re: hardening checkpoints

2005-12-15 Thread Will Maier
e admin makes it. > here's my proposed checklist to carry out for securing a domain > server - This question comes up on email lists all the time; a quick google search will complement your list below. > 1. before attaching server to network install and configure > tripwi

Re: closing unwanted ports - and what is 1720/tcp filtered H.323/Q.931

2005-12-15 Thread Will Maier
On Thu, Dec 15, 2005 at 12:35:09PM +, kevin bailey wrote: > these ports seem to be open by default on a standard sarge setup [...] Not a standard, default setup; you've installed and enabled other services which aren't turned on by default. > the server will just be s

Re: sshd: Logging illegal users

2004-08-20 Thread Will Aoki
On Thu, Aug 19, 2004 at 10:44:40AM +0200, Thomas Hungenberg wrote: > On Sun, 15 Aug 2004 12:34:59 -0600, Will Aoki wrote: > > >> Is there a way to make the sshd included with Debian/woody to also log > >> the usernames an attacker tried to connect with? > > > >

Re: sshd: Logging illegal users

2004-08-15 Thread Will Aoki
On Sun, Aug 15, 2004 at 07:15:18PM +0200, Thomas Hungenberg wrote: > Hello, [snip] > Is there a way to make the sshd included with Debian/woody to also log > the usernames an attacker tried to connect with? Set "LogLevel VERBOSE" in /etc/ssh/sshd_config -- William Aoki KD7YAF [EMAIL PROTECTED]

Re: How To Set Up Mail-out-only System ?

2004-02-12 Thread Will Aoki
a problem, no?) Thus my suggestion of saying in exim.conf that > the only interface the daemon should listen on is loopback. The default Debian Exim configuration will still work even if you remove the links and don't start the daemon: local mail submission works via a setuid binary, not o

Re: How To Set Up Mail-out-only System ?

2004-02-11 Thread Will Aoki
a problem, no?) Thus my suggestion of saying in exim.conf that > the only interface the daemon should listen on is loopback. The default Debian Exim configuration will still work even if you remove the links and don't start the daemon: local mail submission works via a setuid binary, not o

Re: How To Set Up Mail-out-only System ?

2004-02-10 Thread Will Aoki
: " >start-stop-daemon --start --pidfile /var/run/exim/exim.pid \ > --exec $DAEMON -- -bd -q30m If you remove the '-bd', exim will run as a daemon, but it will only send mail out (processing its queue). It won't bind tcp/25 to receive mail. (Exim will use a di

Re: How To Set Up Mail-out-only System ?

2004-02-10 Thread Will Aoki
: " >start-stop-daemon --start --pidfile /var/run/exim/exim.pid \ > --exec $DAEMON -- -bd -q30m If you remove the '-bd', exim will run as a daemon, but it will only send mail out (processing its queue). It won't bind tcp/25 to receive mail. (Exim will use a di

Re: Web based password changer

2004-01-23 Thread Will Aoki
On Fri, Jan 23, 2004 at 12:17:00AM -0700, Will Aoki wrote: > I've attached a slightly cleaned-up version of the password changer that Perhaps this time I'll remember to attach the file *and* the mailing list won't reject it... -- William Aoki KD7YAF [EMAIL PROTECTED]

Re: Web based password changer

2004-01-23 Thread Will Aoki
d; sleep 1; echo $newpasswd; sleep 1; > > echo $newpasswd) | passwd $user > > how about: > > echo $user:$newpasswd | chpasswd Hopefully the script would not actually invoke echo - otherwise, like anything else passed on the command line, the password will show up in the process table fo

Re: Web based password changer

2004-01-23 Thread Will Aoki
On Thu, Jan 22, 2004 at 10:04:48PM -0500, Tom White wrote: > Dear List, > > I'm looking for a decent, secure, web based password changer for > user accounts. Something that I can install on a debian box with a > minimum amount of tweaking, and that isn't really any less secure than > a shell user

Re: Web based password changer

2004-01-23 Thread Will Aoki
On Fri, Jan 23, 2004 at 12:17:00AM -0700, Will Aoki wrote: > I've attached a slightly cleaned-up version of the password changer that Perhaps this time I'll remember to attach the file *and* the mailing list won't reject it... -- William Aoki KD7YAF [EMAIL PROTECTED]

Re: Web based password changer

2004-01-23 Thread Will Aoki
d; sleep 1; echo $newpasswd; sleep 1; > > echo $newpasswd) | passwd $user > > how about: > > echo $user:$newpasswd | chpasswd Hopefully the script would not actually invoke echo - otherwise, like anything else passed on the command line, the password will show up in the process table fo

Re: Web based password changer

2004-01-23 Thread Will Aoki
On Thu, Jan 22, 2004 at 10:04:48PM -0500, Tom White wrote: > Dear List, > > I'm looking for a decent, secure, web based password changer for > user accounts. Something that I can install on a debian box with a > minimum amount of tweaking, and that isn't really any less secure than > a shell user

Re: bridge firewall with kernel 2.4.22

2003-12-01 Thread Will Aoki
On Mon, Dec 01, 2003 at 03:07:14PM +0100, Francisco Oliveira wrote: > hi > I have compiled kernel 2.4.22 for bridge and iptables support. > Bridge is working ok but Layer 3 packets are only processed if they are > addressed to bridge box ip address interface. You need the ebtables patch from http:

Re: bridge firewall with kernel 2.4.22

2003-12-01 Thread Will Aoki
On Mon, Dec 01, 2003 at 03:07:14PM +0100, Francisco Oliveira wrote: > hi > I have compiled kernel 2.4.22 for bridge and iptables support. > Bridge is working ok but Layer 3 packets are only processed if they are > addressed to bridge box ip address interface. You need the ebtables patch from http:

Re: honeyd and libdnet

2003-07-31 Thread Will Aoki
On Thu, Jul 31, 2003 at 01:50:07PM -0400, Noah L. Meyerhans wrote: [snip] > > libdnet has nothing to do with decnet. Its feature list, as shown on > http://libdnet.sourceforge.net/ indicates that it does the following: > * network address manipulation > * kernel arp(4) cache and route(4)

Re: honeyd and libdnet

2003-07-31 Thread Will Aoki
On Thu, Jul 31, 2003 at 01:50:07PM -0400, Noah L. Meyerhans wrote: [snip] > > libdnet has nothing to do with decnet. Its feature list, as shown on > http://libdnet.sourceforge.net/ indicates that it does the following: > * network address manipulation > * kernel arp(4) cache and route(4)

Re: Could sudo be an security issue?

2003-05-14 Thread Will Aoki
a sudo. IN an If someone gets your password, said person will likely be able to manipulate your account so as get root the next time you su. OTOH, if you do want the extra security blanket, you could tweak PAM to have sudo use a different password store or even an entirely different authentication schem

Re: idea for improving security

2003-05-06 Thread Will Aoki
On Tue, May 06, 2003 at 01:07:24PM -0500, Mark Edgington wrote: > Hi, > I'm not sure whether this idea has been considered or implemented > anywhere, but I have been thinking about it, and believe it would provide a > fairly high-level of security for systems which only run a few public > se

Re: frontpage extension and security

2003-02-13 Thread will
e hell spawn of the devil, but that is just my personal opinion ;-) Where can I find information about it? If I was thinking of installing them, I would start here: http://www.google.com/search?q=frontpage+extensions+unix But I am not ;-) Will [0]A big number -- Will Jessop Freela

Re: frontpage extension and security

2003-02-13 Thread will
ll spawn of the devil, but that is just my personal opinion ;-) Where can I find information about it? If I was thinking of installing them, I would start here: http://www.google.com/search?q=frontpage+extensions+unix But I am not ;-) Will [0]A big number -- Will Jessop Freelance web sy

Re: Apache log - what is this?

2002-12-30 Thread Will Aoki
On Mon, Dec 30, 2002 at 02:20:25PM -0500, Stephen Gran wrote: > Hello all, > > I'm seeing the following in my logs (fairly frequently): > > 66.140.25.156 - - [30/Dec/2002:13:31:21 -0500] "CONNECT 213.92.8.4:6667 > HTTP/1.0" 405 303 "-" "-" > 66.140.25.156 - - [30/Dec/2002:13:31:21 -0500] "POST h

Re: Apache log - what is this?

2002-12-30 Thread Will Aoki
On Mon, Dec 30, 2002 at 02:20:25PM -0500, Stephen Gran wrote: > Hello all, > > I'm seeing the following in my logs (fairly frequently): > > 66.140.25.156 - - [30/Dec/2002:13:31:21 -0500] "CONNECT 213.92.8.4:6667 HTTP/1.0" >405 303 "-" "-" > 66.140.25.156 - - [30/Dec/2002:13:31:21 -0500] "POST ht

Re: how to identify the superuser in C

2002-12-11 Thread Will Aoki
On Wed, Dec 11, 2002 at 11:07:11AM +0900, Oohara Yuuma wrote: > I am working on adding a high score list to a game written in C. > (It's already packaged.) The high score list will be 664 root:games > and the game binary will be sgid games --- nothing special here. > I want to du

Re: how to identify the superuser in C

2002-12-11 Thread Will Aoki
On Wed, Dec 11, 2002 at 11:07:11AM +0900, Oohara Yuuma wrote: > I am working on adding a high score list to a game written in C. > (It's already packaged.) The high score list will be 664 root:games > and the game binary will be sgid games --- nothing special here. > I want to du

Re: configuration problem with interaction of krb5 and kde screensaver

2002-09-19 Thread Will Aoki
m_krb5.so auth required /lib/security/pam_unix.so shadow md5 nullok likeauth use_first_pass > Can anybody tell me the right configuration to cure this last problem, > so that every computer on our institute can be upgraded to AFS and > Kerberos ? > > Any pointers to documentation or

Re: configuration problem with interaction of krb5 and kde screensaver

2002-09-19 Thread Will Aoki
m_krb5.so auth required /lib/security/pam_unix.so shadow md5 nullok likeauth use_first_pass > Can anybody tell me the right configuration to cure this last problem, > so that every computer on our institute can be upgraded to AFS and > Kerberos ? > > Any pointers to documentation or

Re: sshd fails reverse dns lookup / host accomplishes reverse dns

2002-08-25 Thread Will Aoki
On Sun, Aug 25, 2002 at 10:32:54AM -0500, Hanasaki JiJi wrote: > computer1 and computer2 > - both run woody > - both have the same /etc/resolve.con > - both have the same ssh config > > ssh from 1 to 2 - no problems > ssh from 2 to 1 - sshd reports a failed reverse dns lookup >

Re: secure file transfer

2002-06-05 Thread Will Aoki
u can "break" scp by making the users shell a menu script (i.e. > /usr/bin/yourmenu instead of /usr/bin/bash) so they can not get to a $ > prompt. You also have to define your menu script as a shell > (/etc/shell) so regular ftp will still work. Or you could use pam_listfile or pa

Re: ssh authentication configuration?

2002-05-29 Thread Will Aoki
reason to turn off PasswordAuthentication but leave PAMAuthenticationViaKbdInt on. [0] in the Debian configuration - if configured at build time without PAM, PasswordAuthentication will use another mechanism to check passwords. -- William Aoki [EMAIL PROTECTED] /"\ ASCII

Re: ssh authentication configuration?

2002-05-29 Thread Will Aoki
reason to turn off PasswordAuthentication but leave PAMAuthenticationViaKbdInt on. [0] in the Debian configuration - if configured at build time without PAM, PasswordAuthentication will use another mechanism to check passwords. -- William Aoki [EMAIL PROTECTED] /"\ ASCII

Re: deploying pam-opie?

2002-05-19 Thread Will Aoki
On Sun, May 19, 2002 at 11:46:10PM -0400, Bradley Alexander wrote: > Hey all, > > I'm trying to get pam-opie working with openssh, but I guess I'm not > getting the hang of it. I think I have all of the packages installed: > > [EMAIL PROTECTED] storm]$ dpkg -l | grep opie > ii libpam-opie0.

Re: deploying pam-opie?

2002-05-19 Thread Will Aoki
On Sun, May 19, 2002 at 11:46:10PM -0400, Bradley Alexander wrote: > Hey all, > > I'm trying to get pam-opie working with openssh, but I guess I'm not > getting the hang of it. I think I have all of the packages installed: > > [storm@defiant storm]$ dpkg -l | grep opie > ii libpam-opie0.21

Re: restricting outbound access?

2002-05-15 Thread Will Aoki
you control who can receive data from the network, but it will let you restrict who can send what. -- William Aoki [EMAIL PROTECTED] /"\ ASCII Ribbon Campaign B1FB C169 C7A6 238B 280B <- key change\ / No HTML in mail or news! 99AF A093 29AE 0A

Re: restricting outbound access?

2002-05-15 Thread Will Aoki
let you control who can receive data from the network, but it will let you restrict who can send what. -- William Aoki [EMAIL PROTECTED] /"\ ASCII Ribbon Campaign B1FB C169 C7A6 238B 280B <- key change\ / No HTML in mail or news! 99AF A093 29AE 0A

Re: A question about some network services

2002-04-02 Thread Will Aoki
y, time is for NTP, > and I'm not sure what discard is used for. 'time' is RFC 868, a pre-NTP time synchronization protocol. It just sends the time as a 32-bit int, where: "The time is the number of seconds since 00:00 (midnight) 1 January 1900 GMT, such that the ti

Re: A question about some network services

2002-04-02 Thread Will Aoki
day, time is for NTP, > and I'm not sure what discard is used for. 'time' is RFC 868, a pre-NTP time synchronization protocol. It just sends the time as a 32-bit int, where: "The time is the number of seconds since 00:00 (midnight) 1 January 1900 GMT, such that the ti

Re: wierd connection attempt

2002-03-16 Thread Will Wesley, CCNA
gt; Exactly. Perhaps this person's ISP is not the filtering the bogus messages from reaching it's other customers, or perhaps the messages are passing through outside routers that are not complying with the RFC, and allowing them to travel so far. It's most likely that it is

Re: wierd connection attempt

2002-03-15 Thread Will Wesley, CCNA
gt; Exactly. Perhaps this person's ISP is not the filtering the bogus messages from reaching it's other customers, or perhaps the messages are passing through outside routers that are not complying with the RFC, and allowing them to travel so far. It's most likely that it is

Re: hosts.{allow,deny} vs iptables.

2002-03-04 Thread Will Aoki
s to the outer world. All other ser­ vices can be "bugged" just like the above tftp example. The result is an excellent early-warning system. If someone on another host with a finger daemon also installed and similarly wrappered tries to connect to anything wrappered on

Re: hosts.{allow,deny} vs iptables.

2002-03-04 Thread Will Aoki
s to the outer world. All other ser­ vices can be "bugged" just like the above tftp example. The result is an excellent early-warning system. If someone on another host with a finger daemon also installed and similarly wrappered tries to connect to anything wrappered on

Re: syslog messages

2002-02-20 Thread Will Wesley, CCNA
ebian.org/security/2000/2719a [2] http://www.cert.org/advisories/CA-2000-17.html Hope I have helped. - Will Wesley, CCNA "Furious activity is no substitute for understanding." -- H.H. Williams

Re: syslog messages

2002-02-20 Thread Will Wesley, CCNA
ebian.org/security/2000/2719a [2] http://www.cert.org/advisories/CA-2000-17.html Hope I have helped. - Will Wesley, CCNA "Furious activity is no substitute for understanding." -- H.H. Williams -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Port 113 (auth) accept or deny?

2002-02-09 Thread Will Aoki
On Sat, Feb 09, 2002 at 09:39:00PM +0100, Johannes Weiss wrote: > > Hi, > I have a security question: > On my HTTP(s)/MAIL(SMTP,POP,IMAP)/SSH-Server: > should I open(accept) or close(deny, perhaps reject?) the port 113??? Accept if you've chosen to run an ident server; otherwise, reject, but don'

Re: Port 113 (auth) accept or deny?

2002-02-09 Thread Will Aoki
On Sat, Feb 09, 2002 at 09:39:00PM +0100, Johannes Weiss wrote: > > Hi, > I have a security question: > On my HTTP(s)/MAIL(SMTP,POP,IMAP)/SSH-Server: > should I open(accept) or close(deny, perhaps reject?) the port 113??? Accept if you've chosen to run an ident server; otherwise, reject, but don

Re: Exim Relay

2002-02-01 Thread Will Aoki
On Fri, Feb 01, 2002 at 04:22:43PM +0100, Laurent Luyckx wrote: > En réponse à Nemesis <[EMAIL PROTECTED]>: > > > Hello everybuddy: > > > > One question, please. > > > > When nessus gives a report and says > > > > "The remote SMTP server allows the relaying. This means that > > it allows spamm

Re: Exim Relay

2002-02-01 Thread Will Aoki
On Fri, Feb 01, 2002 at 04:22:43PM +0100, Laurent Luyckx wrote: > En réponse à Nemesis <[EMAIL PROTECTED]>: > > > Hello everybuddy: > > > > One question, please. > > > > When nessus gives a report and says > > > > "The remote SMTP server allows the relaying. This means that > > it allows spam

Re: [ot] how to create a user that can't log in?

2002-01-20 Thread Will Aoki
On Sun, Jan 20, 2002 at 01:41:44AM -0600, Nathan E Norman wrote: > Hi, > > I'm setting up a project for some friends. I want each of them to > have their own account, but I want the project to be hosted (and run > under) a seperate account. Each user should be able to su to the > project account

Re: [ot] how to create a user that can't log in?

2002-01-20 Thread Will Aoki
On Sun, Jan 20, 2002 at 01:41:44AM -0600, Nathan E Norman wrote: > Hi, > > I'm setting up a project for some friends. I want each of them to > have their own account, but I want the project to be hosted (and run > under) a seperate account. Each user should be able to su to the > project accoun

Re: Debian security being trashed in Linux Today comments

2002-01-16 Thread Will Wesley, CCNA
, and more accurate. Anyone wanna flame me, add to my thoughts, or compliment me? I guess as a side note, I shouldn't say "we" since I doubt I am really eligible to be a major contributer to such a project... Just my two cents, anyhow. -Will Wesley Great way to learn about mknod... bo

Re: Debian security being trashed in Linux Today comments

2002-01-16 Thread Will Wesley, CCNA
, and more accurate. Anyone wanna flame me, add to my thoughts, or compliment me? I guess as a side note, I shouldn't say "we" since I doubt I am really eligible to be a major contributer to such a project... Just my two cents, anyhow. -Will Wesley Great way to learn about mknod...

Re: Don't panic (ssh)

2002-01-14 Thread Will Aoki
On Mon, Jan 14, 2002 at 12:17:15PM +, Iain Tatch wrote: > On 14 January 2002 at 11:48:34 [EMAIL PROTECTED] wrote: > > >> Have I missed something and was I already OK, or is the current stable > >> potato release shipping with a potential ssh security hole? > > > AFAIK, all SSH1 connections

Re: Don't panic (ssh)

2002-01-14 Thread Will Aoki
On Mon, Jan 14, 2002 at 12:17:15PM +, Iain Tatch wrote: > On 14 January 2002 at 11:48:34 [EMAIL PROTECTED] wrote: > > >> Have I missed something and was I already OK, or is the current stable > >> potato release shipping with a potential ssh security hole? > > > AFAIK, all SSH1 connections

Re: SSH configuration problem

2002-01-13 Thread Will Aoki
On Sun, Jan 13, 2002 at 07:05:10PM +0200, Jussi Ekholm wrote: > Will Aoki <[EMAIL PROTECTED]> wrote: > > > Jan 12 20:54:43 badkey sshd[14848]: Connection from 127.0.0.1 port 4074 > [snip...] > > I would've wanted to ask, why I'm getting this kind of messag

Re: SSH configuration problem

2002-01-13 Thread Will Aoki
On Sun, Jan 13, 2002 at 07:05:10PM +0200, Jussi Ekholm wrote: > Will Aoki <[EMAIL PROTECTED]> wrote: > > > Jan 12 20:54:43 badkey sshd[14848]: Connection from 127.0.0.1 port 4074 > [snip...] > > I would've wanted to ask, why I'm getting this kind of messag

Re: SSH configuration problem

2002-01-12 Thread Will Aoki
On Mon, Jan 07, 2002 at 08:00:02PM +0100, Luc MAIGNAN wrote: > Hi, > > my SSH connections don't go to the 'auth.log' file, but the sshd_config seems > to be good. What can happen ? Do you mean that you're not seeing *any* messages from sshd in the log file, or that sshd is logging, but that you

Re: SSH configuration problem

2002-01-12 Thread Will Aoki
On Mon, Jan 07, 2002 at 08:00:02PM +0100, Luc MAIGNAN wrote: > Hi, > > my SSH connections don't go to the 'auth.log' file, but the sshd_config seems > to be good. What can happen ? Do you mean that you're not seeing *any* messages from sshd in the log file, or that sshd is logging, but that you

Re: I've been hacked by DevilSoul

2002-01-12 Thread Will Wesley, CCNA
cracker adds his own super user account to /etc/passwd, tripwire can notify you that there was a change to that file. this is good for recovering by the "maybe it'll be safe once i remove all the changes method" and/or identifying a break in. however if you have been following thi

Re: I've been hacked by DevilSoul

2002-01-12 Thread Will Wesley, CCNA
cracker adds his own super user account to /etc/passwd, tripwire can notify you that there was a change to that file. this is good for recovering by the "maybe it'll be safe once i remove all the changes method" and/or identifying a break in. however if you have been following thi

Re: Need Help with the Debian Securing Manual (contributions accepted)

2001-09-24 Thread Will Aoki
hat receives a request for a document with a preferred language of 'en-GB, fr' when both an 'en' and 'fr' version exist will serve the French one. It will only serve the English document before the French one if there is a version of the file with en-gb for the language

Re: Need Help with the Debian Securing Manual (contributions accepted)

2001-09-23 Thread Will Aoki
hat receives a request for a document with a preferred language of 'en-GB, fr' when both an 'en' and 'fr' version exist will serve the French one. It will only serve the English document before the French one if there is a version of the file with en-gb for the language

Re: shared root account

2001-07-07 Thread Will Aoki
mestamp file per user, instead of one per user per tty) I can wait for the victim to sudo, and then sudo without entering his password. 3 and 4: If the system's running Samba, access to /etc/smbpasswd lets me log in to Samba as anyone who appears in /etc/smbpasswd. If the system is usin

Re: shared root account

2001-07-06 Thread Will Aoki
do, and then sudo without entering his password. 3 and 4: If the system's running Samba, access to /etc/smbpasswd lets me log in to Samba as anyone who appears in /etc/smbpasswd. If the system is using Netatalk with randnum authentication, users' AppleTalk passwords will be sto