RE: compromised system

2000-04-23 Thread Jerry Eckert
What's VOS? Have I been missing out on something interesting?? -Original Message- From: Thomas Charron [mailto:[EMAIL PROTECTED]] Sent: Monday, April 24, 2000 1:27 AM To: Jerry Eckert; [EMAIL PROTECTED] Subject: Re: compromised system > If only we still had the *real* *ics operating sy

Re: compromised system

2000-04-23 Thread Thomas Charron
> If only we still had the *real* *ics operating system -- Multics -- this > wouldn't even be a problem. :) One word.. VOS.. ;-P ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *body*

Re: Derek's been hacked

2000-04-23 Thread Jerry Callen
"Karl J. Runge" wrote: > /bin/login needs to be able to change to the userid who is logging in > (e.g. via something like setuid(2)). In some cases /bin/login is run > by an unprivileged process. Is there a semi-canonical list of the things that must run setuid on a Linux system, and why? This

RE: compromised system

2000-04-23 Thread Jerry Eckert
Derek Martin wrote: > > someone just asked >if RH configures named to run as a non-root user. The named daemon binds >to port 53, which is a "reserved" port, and requires root priviledges for >this operation. Is it possible for named to start run

Re: IPChains

2000-04-23 Thread Kenneth E. Lussier
At 08:16 PM 4/23/00 -0400, Benjamin Scott wrote: >On Sun, 23 Apr 2000, Kenneth E. Lussier wrote: > > One problem that I am faced with now it trying to learn more about > > ipchains ( I know the basics already, but there is a lot more detail that > > I would like to know) ... > > Such as...? Fo

Re: compromised system

2000-04-23 Thread Marc Evans
The biggest problem that you *may* encounter depending upon your configuration is going to be log/status/debug files. Of course, if you ever decide to be a slave for anything, your problems will be more complex. - Marc On Sun, 23 Apr 2000, Derek Martin wrote: > Today, Marc Evans gleaned this in

Re: compromised system

2000-04-23 Thread Derek Martin
Today, Marc Evans gleaned this insight: > People should really consider running daemons like named in a chroot'ed > environemnt (see http://www.psionic.com/papers/dns/ for example). You > should also consult the INSTALL file in the source distribution, which > discusses the -u, -g and -t options:

Re: system compromised

2000-04-23 Thread Marc Evans
I recommend reading what is driving bind version 9: http://www.isc.org/products/BIND/plans.html - Marc On Sun, 23 Apr 2000, Kenneth E. Lussier wrote: > BIND has been around longer than I have, so most of my knowledge on the subject > is in retrospect. However, from everything that I ha

Re: IPChains

2000-04-23 Thread Benjamin Scott
On Sun, 23 Apr 2000, Kenneth E. Lussier wrote: > One problem that I am faced with now it trying to learn more about > ipchains ( I know the basics already, but there is a lot more detail that > I would like to know) ... Such as...? For general firewall theory, I'd say the O'Reilly book is pre

Re: system compromised

2000-04-23 Thread Kenneth E. Lussier
BIND has been around longer than I have, so most of my knowledge on the subject is in retrospect. However, from everything that I have read and heard from people, there hasn't been a version of bind yet that hasn't had some sort of major security vulnerability. I'm not sure if it is because the cr

Re: system compromised

2000-04-23 Thread Kenneth E. Lussier
What you are showing is quite true... for RH6.2. The system in question is 6.1, and the errata for 6.1 only brings you up to P3. >From RH's 6.1 Errata Page: 4. Relevant releases/architectures: Red Hat Linux 6.1, all architectures ftp://updates.redhat.com/6.1/i386/

Re: IPChains

2000-04-23 Thread Kenneth E. Lussier
I said that I wouldn't comment on Rob Zeiglers book because I haven't read it. However, from what you have described, the book is an extension of the utility that he has on the web for building a firewall script. I was never a big fan of the tool because it bloated the script with far to many thin

Re: compromised system

2000-04-23 Thread Benjamin Scott
On Sun, 23 Apr 2000, Derek Martin wrote: > I deleted the message before I could reply to it, but someone just asked > if RH configures named to run as a non-root user. The named daemon binds > to port 53, which is a "reserved" port, and requires root priviledges for > this operation. It would

Re: compromised system

2000-04-23 Thread Marc Evans
People should really consider running daemons like named in a chroot'ed environemnt (see http://www.psionic.com/papers/dns/ for example). You should also consult the INSTALL file in the source distribution, which discusses the -u, -g and -t options: User and Group ID Specifying "-u"

Re: compromised system

2000-04-23 Thread Derek Martin
I deleted the message before I could reply to it, but someone just asked if RH configures named to run as a non-root user. The named daemon binds to port 53, which is a "reserved" port, and requires root priviledges for this operation. There's no other reason that I'm aware of that named couldn

Re: system compromised

2000-04-23 Thread Jeff Macdonald
I've been cracked via bind 4 times over the past year. Each bind was a different version. The last time was my workstation on a LAN at work. Yes, the LAN should of been firewalled, but more important is to not run services that you don't really need. For workstations, use the workstation insta

Re: bind sploit test

2000-04-23 Thread Karl J. Runge
On Sun, 23 Apr 2000, dsbelile <[EMAIL PROTECTED]> wrote: > > it's easy enough to figure out if you vulnerble to the bind sploit: > issue > : dig @victim.com version.bind chaos txt | grep \"8 > > later! chris Are you saying the current exploit is for ALL 8.* versions of BIND? I was guessing

Re: Stupid Apache question..

2000-04-23 Thread Thomas Charron
Found it no sooner then I sent the darned message.. I'm not sure what put the directive in httpd.conf, but the Files section looked like this: Order allow,deny Deny from all It was either shipped in the default install, or put there by linuxconf, which I used to configure

Stupid Apache question..

2000-04-23 Thread Thomas Charron
Guys, this is probrably a one liner fix, but here's the scoop. I have an in house network with 5 computers hooked up, 1 Win98, 1 NT Workstation, 1 NT Server, 2 Linux. I recently began looking at porting some of the ASP WAP pages I've been working on for work to Apache and PHP. That's the

Re: bind sploit test

2000-04-23 Thread Rodent of Unusual Size
dsbelile wrote: > > it's easy enough to figure out if you vulnerble to the bind sploit: > issue > : dig @victim.com version.bind chaos txt | grep \"8 Oh, ah? Changing '@victim.com' to your own server, yes? And how does one tell from the output whether one is vulnerable or not? -- #kenP-)}

bind sploit test

2000-04-23 Thread dsbelile
it's easy enough to figure out if you vulnerble to the bind sploit: issue : dig @victim.com version.bind chaos txt | grep \"8 later! chris ** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the following text in the *bo