Re: [CentOS] Ideas for stopping ssh brute force attacks

2008-07-21 Thread Eucke


Dan Carl wrote:

Just change the default port.
You can also limit the allowed nocks on door with iptables, but changing the
port is much eaieer.
Cleans up the logs real nice.
Dan
  


I'll second that.  Combining that with the SSH iptables entries to limit 
the number of attempts will help as well.  Those two actions will, 
effectively, make the brute force impossible.



--
Eucke


___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Anti Virus and Anti Spam

2008-08-29 Thread Eucke


horas simalango wrote:

New be in linux!
Currently I have Install DNS, Email and Web server using centos 4.3.
All functions are running properly!
What anti virus and anti spam recomended for me to install to my
server? What I have to configure after installing anti virus and anti
spam?
Would some one help me please.! Now many spam mail come to user mailbox!

Thank's 'n Regards
Well there are builds of spamassassin available via RPM that you can 
install.  You might mention which MTA you're usingSendmail?  
Postfix?  If you're using Sendmail then you can use milter plugins for 
spam and antivirus.  Are you looking for free antivirus plugins or ones 
your pay for?


--
Eucke


___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Anti Virus and Anti Spam

2008-08-29 Thread Eucke


horas simalango wrote:

New be in linux!
Currently I have Install DNS, Email and Web server using centos 4.3.
All functions are running properly!
What anti virus and anti spam recomended for me to install to my
server? What I have to configure after installing anti virus and anti
spam?
Would some one help me please.! Now many spam mail come to user mailbox!

Thank's 'n Regards
Well there are builds of spamassassin available via RPM that you can 
install.  You might mention which MTA you're usingSendmail?  
Postfix?  If you're using Sendmail then you can use milter plugins for 
spam and antivirus.  Are you looking for free antivirus plugins or ones 
your pay for?


--
Eucke


___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Anti Virus and Anti Spam

2008-09-01 Thread Eucke

horas simalango wrote:

I am using sendmail as MTA, and I am looking for free anti virus.
About the milter, where can I download it?

Thank you

Horasima


I don't think all of this is available via the the conventional centos 
mirrors but I'd bet they're on Dag's as well as a few others.  find one 
you trust. 

I am pasting the following from this website  
http://www.be4mind.com/?q=node/190
I gave it a once over and it looks fairly complete.  This write includes 
adding greylisting as well.



PLEASE COPY CONFIGURATION FILE OPTIONS FROM THE ATTACHED DOCUMENT 
(NEWLINES PROBLEMS IN HTML) OTHERWISE SOMETHING COULD GO WRONG 
(EXPECIALLY WITH SENDMAIL).


Follow these steps to try stopping sPaMmErs :)

1. CONFIGURING YUM REPOSITORIES
[EMAIL PROTECTED] ~]# wget http://centos.karan.org/kbsingh-CentOS-Extras.repo
[EMAIL PROTECTED] ~]# wget http://centos.karan.org/kbsingh-CentOS-Misc.repo
[EMAIL PROTECTED] ~]# mv *.repo /etc/yum.repos.d/
[EMAIL PROTECTED] ~]# rpm --import 
http://centos.karan.org/RPM-GPG-KEY-karan.org.txt
[EMAIL PROTECTED] ~]# wget 
http://dag.wieers.com/packages/rpmforge-release/rpmforge-release-0.3.6-1.el4.rf.i386.rpm

[EMAIL PROTECTED] ~]# rpm -ivh rpmforge-release-0.3.6-1.el4.rf.i386.rpm

2. INSTALLING REQUIRED PACKAGES
#FROM kbsingh
[EMAIL PROTECTED] ~]# yum install milter-greylist spamassassin 
spamass-milter pyzor


#FROM rpmforge
[EMAIL PROTECTED] ~]# yum install clamd.i386
Installed: clamd.i386 0:0.90.3-1.el4.rf
Dependency Installed: clamav.i386 0:0.90.3-1.el4.rf clamav-db.i386 
0:0.90.3-1.el4.rf

Complete!
[EMAIL PROTECTED] mail]# yum install clamav-milter.i386
Installed: clamav-milter.i386 0:0.90.3-1.el4.rf
Complete!

3. SENDMAIL CONFIGURATION
-Backup your sendmail config files and edit sendmail.mc:
[EMAIL PROTECTED] ~]# cd /etc/mail
[EMAIL PROTECTED] mail]# cp sendmail.mc sendmail.mc.orig
[EMAIL PROTECTED] mail]# mv sendmail.cf sendmail.cf.orig

-Add the following line just before the two MAILER lines:
[EMAIL PROTECTED] mail]# vi sendmail.mc

[...]
dnl #
dnl # ANTISPAM/VIRUS AND GREYLIST AND DNSBL
dnl #
FEATURE(`dnsbl',`relays.ordb.org')dnl
FEATURE(`dnsbl',`list.dsbl.org')dnl
FEATURE(`dnsbl',`sbl-xbl.spamhaus.org')dnl
INPUT_MAIL_FILTER(`greylist',`S=local:/var/lib/milter-greylist/run/milter-greylist.sock')
define(`confMILTER_MACROS_CONNECT', `j, {if_addr}')
define(`confMILTER_MACROS_HELO', `{verify}, {cert_subject}')
define(`confMILTER_MACROS_ENVFROM', `i, {auth_authen}')
INPUT_MAIL_FILTER(`spamassassin', 
`S=local:/var/run/spamass-milter/spamass-milter.sock, 
F=,T=C:15m;S:4m;R:4m;E:10m')dnl
INPUT_MAIL_FILTER(`clamav', `S=local:/var/clamav/clmilter.socket, F=T, 
T=S:4m;R:4m')

dnl #
MAILER(smtp)dnl
MAILER(procmail)dnl

-Compile sendmail.mc:
[EMAIL PROTECTED] mail]# m4 sendmail.mc > sendmail.cf

4. CONFIGURE SPAMASSASIN
-There's a nice spamassasin configurator at:
http://www.yrex.com/spam/spamconfig.php

-Create your config file and put it in /etc/mail/spamassassin/local.cf
[EMAIL PROTECTED] mail]# cp /etc/mail/spamassassin/local.cf 
/etc/mail/spamassassin/local.cf.orig

[EMAIL PROTECTED] mail]# vi /etc/mail/spamassassin/local.cf
-
# SpamAssassin config file for version 3.x
# NOTE: NOT COMPATIBLE WITH VERSIONS 2.5 or 2.6
# See http://www.yrex.com/spam/spamconfig25.php for earlier versions
# Generated by http://www.yrex.com/spam/spamconfig.php (version 1.50)

# How many hits before a message is considered spam.
required_score 3.0

# Change the subject of suspected spam
rewrite_header subject *SPAM*

# Encapsulate spam in an attachment (0=no, 1=yes, 2=safe)
report_safe 1

# Enable the Bayes system
use_bayes 1

# Enable Bayes auto-learning
bayes_auto_learn 1

# Enable or disable network checks
skip_rbl_checks 0
use_razor2 1
use_pyzor 1

# Mail using locales used in these country codes will not be marked
# as being possibly spam in a foreign language.
ok_locales en

## General Whitelist
## Be careful using "whitelist_from" can be easly forged by spammers, use
## trusted_networks combined with whitelist_from_rcvd instead
#internal_networks 127.0.0.1 192.168.1.0/24
#trusted_networks 127.0.0.1 192.168.1.0/24 64.233.0.0/16
#whitelist_from_rcvd [EMAIL PROTECTED] *gmail.com,*google.com
#whitelist_from [EMAIL PROTECTED]
-

5. CONFIGURE CLAMAV:
Make sure config files are enabled by editing them as follows:
[EMAIL PROTECTED] mail]# vi /etc/freshclam.conf
Comment or remove the line below.
#Example

[EMAIL PROTECTED] mail]# vi /etc/clamd.conf
Comment or remove the line below.
#Example

Edit freshclam config file and remove or comment last line with 
FRESHCLAM_DELAY
directive. Optionally run freshclam from the root console to check that 
everything

works.

Use the cron

Re: [CentOS] How fast?

2009-10-06 Thread Warren, Eucke
-Original Message-
> From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On
Behalf Of Sorin Srbu
> Sent: Tuesday, October 06, 2009 12:23 AM
> To: 'CentOS mailing list'
> Subject: Re: [CentOS] How fast?

> If I may suggest Smoothwall for a firewall appliance...? This is a
specialty distro, IPCop is another similar distro. Smoothwall's even got
a simple 
> static DNS built-in, just the thing for a smallish home network. Might
be just what the OP is looking for?
> --
> /Sorin

I'll throw in a second for Smoothwall. If you want to get really fancy
there's a ton of firewall options available within their homebrew
community.  Just about any feature you could want in a firewall is
available there.

Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Rebuild xorg (continued from Centos-devel)

2008-12-22 Thread Warren, Eucke
On 2008-12-22, 17:38 GMT, William L. Maltby wrote:
>> Well, having faith that things really _are_ working, one of his 
>> messages in the log file about insufficient memory reminded me that 
>> many laptops and less-expensive desktops have shared memory. I've 
>> suggested that he check BIOS for various things.

>No such thing should be necessary to get Xorg working. If it doesn't work 
>without such black magic, then it is broken.

>Matěj


Perhaps removing all of xorg, Gnome and xwindows is inorder and then a 
reinstall via yum of the groups is in order?

yum groupinstall "X Window System" "GNOME Desktop Environment"

Between a possible bad install to all of the tinkering...return to the baseline 
and try again.

-- 
Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


[CentOS] Update to Centos 5 anaconda kickstart %post bug?

2009-01-08 Thread Warren, Eucke
Is there a process for finding status updates to open bugs within
Centos?  The particular bug I am talking about is 0002329
http://bugs.centos.org/view.php?id=2329.  This was assigned on
01-20-2008 and, as far as I can tell, there's been no action other than
it being acknowledged.  I've also searched upstream with RHEL and FC and
I cannot seem to find a bug report there though complaints of the
problem can be found through searching the web.

I do see the manual fix for it and will be testing that shortly.  I am,
however, dealing with a fairly rigid internal legal department that may
not welcome a "fix" that's not "official".  So I have two questions:

1) Is there an "official" or "accepted" way to inquire about the status
of an open bug?
2) With regard to bug 0002329 is this something that has to be fixed
upstream so it filters down to centos?

Thank you!
 
Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Update to Centos 5 anaconda kickstart %post bug?

2009-01-08 Thread Warren, Eucke
Scott Silva wrote:
> The bug page gives you the status. It was assigned (to Karanbir), and
he ack'ed it. If it was fixed, it would 
> be resolved. It shouldn't be that hard to apply the fix manually and
your legal department is too rigid if they 
> are that picky about a fix to "free" software. I can see if they were
paying contract support on it.

I appreciate the response.  If you recall I did post the link so it's a
safe assumption that I read the page and understood it's content.  What
I'm after is whether there's any other information channel that might
not be so obvious for seeing if there might be action coming up for an
particular issue.  Being in a highly regulated industry the legal
department has a tough job.  I work within the guidelines they set.

> If Karanbir thinks it merits an upstream bug report, I'm almost sure
he might do that, if the original bug 
> poster doesn't. It "might" be fixed by the time
> 5.3 comes out, but do you want to wait?

I am restricted to 5.1 as approved by legal.  5.2 is not approved so 5.3
isn't an option either.  Once I can sort out whether something
"official" will fix this I can then determine how to pursue this
internally.  A workaround fix does not address that the kickstart-built
system will still contain this bug as it will be built from RPM's that
are not fixed.



Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Update to Centos 5 anaconda kickstart %post bug?

2009-01-08 Thread Warren, Eucke
Lanny Marcus Wrote:
> Does that mean that your Legal Department does not permit you  to
upgrade your box, to get the latest packages, 
> issued for Security & Stability reasons? 5.1, as you are well aware,
is not the latest and greatest.

That is correct.  What they approve is based on the contents of the DVD
or CD for a particular version at the time of initial release.  The
governmental regulatory framework in which we work is what drives the
requirements.  I am well aware that 5.1 is not the latest, greatest,
current or anything else of that matter. 



Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Update to Centos 5 anaconda kickstart %post bug?

2009-01-08 Thread Warren, Eucke
Scott Silva wrote:
> You might want to hint to your legal department that unpatched servers
sitting on the internet are just waiting > to be hacked and exploited.
The fact that they make you sit with an older version without any
patches says that 
> they have no idea how much damage can be done, or how much info can
leak from unpatched systems.

> Maybe if a million customer records leak out because they won't let
you patch systems they might update their thinking.

Not relevant.  These machines are not tied to any public network.  As
much as I appreciate the commentary and lessons you're not telling me
anything I'm not already aware of.  I'm simply seeking some insight on
this particular bug and, more generally, if there's a better way to find
status on something like this.  So far RP Herrold has helped most as I
was not aware that there's been much conversation within anaconda and
kickstart mailing lists.



Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] Update to Centos 5 anaconda kickstart %post bug?[SOLVED]

2009-01-09 Thread Warren, Eucke
I appreciate the input on this question from those who have made
suggestions.  As the unofficial "fix" for %post does not change the
target build (as the anaconda rpms are untouched) I will move in that
direction.  Those of you speculating will have to accept that there is
much I cannot share and much of which you do not know about the systems
and target environment. To suggest a "shaming" only makes the Centos
community look bad as it would be done so without understanding the
entire environment and situation.  Thank you.


Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] mirroring centos servers

2009-02-10 Thread Warren, Eucke
Fabian posted:
> apprecite if someone can help me of any site with examples on how to
mirror 2 centos servers so i one fails the other works perfect

Can you describe what services these servers will be providing?


Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] 5.2 x86_64 DVD

2009-02-11 Thread Warren, Eucke


From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On
Behalf Of ward.p.fonte...@wellsfargo.com
Sent: Wednesday, February 11, 2009 3:17 PM
To: CentOS@centos.org
Subject: [CentOS] 5.2 x86_64 DVD

Paul Fontenot said:

> I've pulled this down with Firefox, wget, a bittorrent client and an
ftp client using Windows as well as Linux hosts. Is something wrong with
the
> distributed DVD image? It has failed an MD5 check every time I've
pulled it down.

I created my own as I needed it as I already had the CD's.  This site
http://www.electrictoolbox.com/save-time-bandwidth-dvd-from-cds/
actually does a good job of explaining how.

Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] installing updates in post kickstart

2009-04-10 Thread Warren, Eucke
Jerry Geis wrote:

> I can do a yum update in my post kickstart (which is what I am doing
now actually).

> However, I want to save network time at installations.
> If I copy down the files from centos/5.3/updates/x86_64/RPMS and place
them in a directory local on my network, can I just "rpm -U 
> /mnt/directory/updates/x86_64/RPMS*"
> in my post section?

> Assuming I have nfs mounted the directory of course...

You can always replace the updated RPMS in the CentOS directory and run
createrepo to rebuild the comps.xml and header info so that you do your
initial build with the newer files without running yum at all.  Ymmv


Eucke
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos