Re: [Full-disclosure] Multiple vulnerabilities in SimpGB

2011-02-06 Thread Michele Orru
ahaah. Nice reply Sparky. MustLive, seems you've been defaced :-) antisnatchor laurent gaffie February 5, 2011 3:36 AM Hey

Re: [Full-disclosure] encrypt the bash history

2011-02-06 Thread Zerial.
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 02/04/11 16:36, Erik Falor wrote: On Fri, Feb 04, 2011 at 04:18:53PM -0300, Zerial. wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 02/04/11 16:13, valdis.kletni...@vt.edu wrote: On Fri, 04 Feb 2011 16:06:06 -0300, Zerial. said: what

Re: [Full-disclosure] encrypt the bash history

2011-02-06 Thread Rodrigo Rubira Branco (BSDaemon)
Nice tip, but this solution doesn't work for me. I don't wanna avoid logging commands nor delete the bash history nor hide the commands. I wanna encrypt the file. I don't wanna miss commands which I executed. Another solution may be copy and move the history file from the server to the

Re: [Full-disclosure] encrypt the bash history

2011-02-06 Thread Peter Maxwell
To be honest, none of these methods will actually be effective: root can do what he/she likes, including monitoring *everything* you do. Worrying about shell history is not going to solve anything. Your only choices are to trust root, or setup your own host. Peter Maxwell On 6 February 2011

Re: [Full-disclosure] encrypt the bash history

2011-02-06 Thread Emanuel dos Reis Rodrigues
I agree with Peter, if you control the root user ... the bash history is the minnor problem ... Emanuel dos Reis Rodrigues Senior Level Linux Professional (LPIC-3) LPI 302 (Mixed Environment) Specialty LPI 304 (Virtualization and High Availability) Specialty C|EH Certified Ethical Hacker

[Full-disclosure] vswitches: physical networks obsolete?

2011-02-06 Thread phocean
Hi all, I would like to get some feedback about the vswitches and how to deal with physical network separation. I have an idea about this but I would like to know the consensus of the security community to feel more confortable with it. There is a great article summing up the possible

Re: [Full-disclosure] vswitches: physical networks obsolete?

2011-02-06 Thread Luigi Rosa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 phocean said the following on 06/02/11 15:47: I would like to get some feedback about the vswitches and how to deal with physical network separation. vmware certifies the solution DMZ+LAN within a single vmware host with two vswitches. This is of

Re: [Full-disclosure] vswitches: physical networks obsolete?

2011-02-06 Thread phocean
Hi Luigi, vmware certifies the solution DMZ+LAN within a single vmware host with two vswitches. This sounds highly questionable, especially after reading the article of Brad. The same goes with Cisco of course. So what else than the marketing guy certification can we get? Before designing an

Re: [Full-disclosure] vswitches: physical networks obsolete?

2011-02-06 Thread phocean
For instance, the switch software isolates the communication betwenn port A, B, and C, that is if you send an unicast packet from A to B, C cannot read it. But the switching engine is not hardware, is software, so you could not trust it. This is the same when you compare physical

Re: [Full-disclosure] vswitches: physical networks obsolete?

2011-02-06 Thread Luigi Rosa
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 phocean said the following on 06/02/11 16:58: So my worries remain... how do they address this? You don't mean that we have to wait for the next 0-day for the VMware claim to be proved false? There are coding vulnerabilities everywhere. We could

Re: [Full-disclosure] vswitches: physical networks obsolete?

2011-02-06 Thread phocean
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 phocean said the following on 06/02/11 16:58: So my worries remain... how do they address this? You don't mean that we have to wait for the next 0-day for the VMware claim to be proved false? There are coding vulnerabilities everywhere.

Re: [Full-disclosure] vswitches: physical networks obsolete?

2011-02-06 Thread Albert R. Campa
vmware has come out with their vshield virtual firewall product. Altor/Juniper has had a virtual firewalling product for a while now. On Sun, Feb 6, 2011 at 11:24 AM, phocean 0...@phocean.net wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 phocean said the following on 06/02/11

Re: [Full-disclosure] encrypt the bash history

2011-02-06 Thread Zach C.
Pretty much what the others said with the addition that if you can't trust root, you simply cannot trust *any* command on that machine, including gpg, since root can compromise them in many ways, too. Best bet is to download it every session and clear it -- but be warned that even any method used

Re: [Full-disclosure] vswitches: physical networks obsolete?

2011-02-06 Thread phocean
Le dimanche 06 février 2011 à 13:48 -0600, Albert R. Campa a écrit : vmware has come out with their vshield virtual firewall product. Altor/Juniper has had a virtual firewalling product for a while now. Which is still another module running on the same host with the same OS...

[Full-disclosure] IO wait chains in Linux??

2011-02-06 Thread Cal Leeming [Simplicity Media Ltd]
So, the Windows based 'Resource Monitor' seems to have a neat little feature called 'Wait chain', which lets you see which processes are currently stuck waiting for IO. Is anyone aware of a Linux based CLI equivalent, which will show the processes stuck in IO wait, in a tree format? And before

Re: [Full-disclosure] encrypt the bash history

2011-02-06 Thread Cal Leeming [Simplicity Media Ltd]
This may/may not be relevant to your interests. Me and a friend once stumbled across a lovely sys admin many years ago, that patched bash to force it to log remotely (no I don't have the source). Long story short, it got the desired effect that the sys admin was wanting lol. On Sun, Feb 6, 2011

Re: [Full-disclosure] Multiple vulnerabilities in SimpGB

2011-02-06 Thread Cal Leeming [Simplicity Media Ltd]
I think it's time for a group hug :| On Sun, Feb 6, 2011 at 10:43 AM, Michele Orru antisnatc...@gmail.comwrote: ahaah. Nice reply Sparky. MustLive, seems you've been defaced :-) antisnatchor -- laurent gaffie laurent.gaf...@gmail.com February 5, 2011