an issue with recent security advisories

2007-06-18 Thread Tomasz Ciolek
Hi All

have packages for these updates:

[DSA 1308-1] New iceweasel packages
[DSA 1309-1] New PostgreSQL 8.1
[DSA 1310-1] New libexif packages

been uploaded to the repositories and added to Releases and Packages
files?

The reason I ask is that for the past 72 hours my apt tells me there is
nothign to be updated, but I am running older version of postgresql and
an older version of iceweasel...

Whats the point of making a security advisory if the packages are NOT
AVAILABLE in mirrors and repositories

here is my sources.list... maybe I have some misconfiguraion ?

deb ftp://ftp.au.debian.org/debian/ etch main contrib non-free
deb ftp://ftp.au.debian.org/debian-security/ etch/updates main contrib non-free
deb http://volatile.debian.net/debian-volatile/ etch/volatile main contrib 
non-free

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature


Re: an issue with recent security advisories

2007-06-18 Thread Tomasz Ciolek
 may thanks to all who replied. 

It all works happy now.

regards
Tomasz Ciolek

On Mon, Jun 18, 2007 at 10:59:05AM +0100, Steve Kemp wrote:
> On Mon Jun 18, 2007 at 19:49:28 +1000, Tomasz Ciolek wrote:
> 
> > been uploaded to the repositories and added to Releases and Packages
> > files?
> 
>   Yes.
> 
> > Whats the point of making a security advisory if the packages are NOT
> > AVAILABLE in mirrors and repositories
> > 
> > here is my sources.list... maybe I have some misconfiguraion ?
> 
>   You're missing:
> 
>   deb http://security.debian.org/ etch/updates main contrib non-free
> 
>   We suggest people never mirror the security archive, to avoid
>  problems, and this is the place where security updates will be
>  uploaded to.
> 
>   The sources lists you have would only receive new updates for
>  point releases of Etch.
> 
> Steve
> -- 

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature


Re: [SECURITY] [DSA 3292-1] cinder security update

2015-06-20 Thread Tomasz Ciolek
On Sat, Jun 20, 2015 at 07:35:14PM -0400, Bryan L. Gay wrote:
> Your email for CVE-2015-1851 does not verify against your GPG signature:
> 
> Wrong signature of Sebastien Delafond
> 
> 
> On Fri, Jun 19, 2015 at 7:52 AM, Sebastien Delafond  wrote:

no issue here... maybe your GPG did not pull the public key from the servers? 

Tomasz

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature


Re: OT: how do You protect an email relay service?

2009-05-30 Thread Tomasz Ciolek
Two ways:

for clients who have thier own mail servers and need to relay and for people
with Linux laptops who can run posfix or exim we permi relaying based on TLS
certificate presented by the MTA.

For those who use Windows based dekstops: pop-before-smtp daemon.

All others get greylisted: http://en.wikipedia.org/wiki/Greylisting

Cheers
Tomasz Ciolek

On Sat, May 30, 2009 at 02:54:16PM +0700, Sthu Deus wrote:
> Good day.
> 
> 
> If You use an email relay service, how do You protect it: VMs, iptables
> connections rate limit, ... ?
> 
> Personally, I have a problem with email sending authorization - how I can
> separate the users that have not their boxes on our service and therefore I 
> can
> ban their trials to pick up a password - I can not reduce it even to the local
> net IPs bt iptables - as port 25 is used for not only for sending our own 
> users
> but for receiving it for the local users - as I understand.
> 
> 
> Thank You for Your time.
> 
> 
> -- 
> To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature


Re: [SECURITY] [DSA 2403-2] php5 security update

2012-02-06 Thread Tomasz Ciolek
Danny,

 I believe this is a re-issue to vocer lenny and sid/wheezy, as the original 
php5 advisory for this issue was lenny only. 

Tomasz

On Mon, Feb 06, 2012 at 08:30:19PM +0100, Danny van der Meulen wrote:
> *sigh*
> 
> And here we go once again...
> 
> D
> 
> On 02/06/2012 08:21 PM, Thijs Kinkhorst wrote:
> >-BEGIN PGP SIGNED MESSAGE-
> >Hash: SHA1
> >
> >- -
> >Debian Security Advisory DSA-2403-2   secur...@debian.org
> >http://www.debian.org/security/   Thijs Kinkhorst
> >February 06, 2012  http://www.debian.org/security/faq
> >- -
> >
> >Package: php5
> >Vulnerability  : code injection
> >Problem type   : remote
> >Debian-specific: no
> >CVE ID : CVE-2012-0830
> >
> >Stefan Esser discovered that the implementation of the max_input_vars
> >configuration variable in a recent PHP security update was flawed such
> >that it allows remote attackers to crash PHP or potentially execute
> >code.
> >
> >This update adds packages for the oldstable distribution, which were
> >missing from the original advisory. The problem has been fixed in
> >version 5.2.6.dfsg.1-1+lenny16, installed into the security archive
> >on 3 Feb 2012.
> >
> >For the stable distribution (squeeze), this problem has been fixed in
> >version 5.3.3-7+squeeze7.
> >
> >For the unstable distribution (sid), this problem has been fixed in
> >version 5.3.10-1.
> >
> >We recommend that you upgrade your php5 packages.
> >
> >Further information about Debian Security Advisories, how to apply
> >these updates to your system and frequently asked questions can be
> >found at: http://www.debian.org/security/
> >
> >Mailing list: debian-security-annou...@lists.debian.org
> >-BEGIN PGP SIGNATURE-
> >Version: GnuPG v1.4.11 (GNU/Linux)
> >
> >iQEcBAEBAgAGBQJPMCgcAAoJEOxfUAG2iX57D2UH/1ObFjP57TX0K+iH2n4+1dkN
> >73ZMXEEudfZdRmKY2fHl4BcNb7hVGruKPSSnHVWHjgaoIoPPHST5dncSqi1946Km
> >oXyOB/eyiYLvhRYKjExRt99GIoC89p8VUsPE8uR3IT5cUsp4nPIQDnhLLnQd4VCk
> >Da9m5CzrAGU1RiCilb7IqKVedqQ3ewroDbgVHoRpzvpIkvKNXR3jhZSEvYHB4BQ7
> >qvnmOMNwJ+Dx6ZoS+sZpCBvucubo1nldyFCqqznc9OZMHXIgn7//YQAYcYGDkC8U
> >WL35ZubBP5+Vbnoh4Gjm1q5thizvMTZJD13dqY//0swqwEigLT1DodB1WL2Z2Bs=
> >=222m
> >-END PGP SIGNATURE-
> >
> >
> 
> 
> -- 
> To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
> Archive: http://lists.debian.org/4f302a4b.90...@ebay.com

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120206210742.ge1...@vandradlabs.com.au



Re: [SECURITY] [DSA 2698-1] tiff security update

2013-06-19 Thread Tomasz Ciolek
Hi All

On Wed, Jun 19, 2013 at 07:39:00PM +0200, Kurt Roeckx wrote:
> On Wed, Jun 19, 2013 at 08:44:02AM +0200, Roland Karch wrote:
> > Hi,
> > 
> > I have noticed that my wheezy install has this package installed which was
> > not updated by the packages in this advisory:
> > ii  libtiff4:armel3.9.6-11
> > armelTag Image File Format (TIFF) library (old version)
> > 
> > Seeing how there was also an update for squeeze's 3.9.4 version, I am now
> > wondering if this version in wheezy was forgotten in the update?
> 
> I'm not sure where you get that 3.9.6 from, but the advisory says:
> - squeeze: 3.9.4-5+squeeze9
> - wheezy: 4.0.2-6+deb7u1
> 
> And you seem to be running a version somewhere in between those 2.
> 

I appear to have the same on my system which has both libtiff4 and libtiff5 
installed.

ii  libtiff4:amd643.9.6-11
ii  libtiff4:i386 3.9.6-11
ii  libtiff5:amd644.0.2-6+nmu1

So I suspect that there is a version/build that has been missed/skipped somehow

Cheers
Tomasz

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature


Re: pc is compromised

2014-03-15 Thread Tomasz Ciolek
 all 3 links arew empty? 


On Sat, Mar 15, 2014 at 02:10:35PM +0100, yb...@hushmail.com wrote:
> here is the log of wireshark, I removed some packages that reported
> the mac andress, attach the files that are pcapng 
> 
> this and 'the newly connected PC (here I'm using google dns)
> https://filetea.me/t1s9VaxuNRWQAWOftoZ1foOUg
> 
> and this' when I start firefox and go to google.com
> https://filetea.me/t1sV3uEy37JRU2y9ofZqvRhXA 
> 
> this (the interesting and not too long) is the log before installing
> fresh, I had nothing open (services, browsers, etc.)
> https://filetea.me/t1sEexcOWJvSnK1HLE9CLlSxw

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature


Re: RFC: fail2ban wheezy security update

2014-07-08 Thread Tomasz Ciolek

Hi guys

Perhaps the best way is to sumbmit these patches to the Debian fail2ban 
maintainer? 


On Mon, Jul 07, 2014 at 04:41:04PM -0600, Jason Fergus wrote:
> I run a postfix at home, and I just installed your new package.  It does
> look pretty good so far.  Also reminds me I should pay more attention to
> my logs.  There are a lot of attempts to connect from unauthorized
> people.  Of course I'm sure that happens everywhere, which is why we use
> fail2ban in the first place!
> 
> On Mon, 2014-07-07 at 17:55 -0400, Yaroslav Halchenko wrote:
> > Dear Security Enthusiasts,
> > 
> > Would someone be kind to verify correct operation of a perspective security
> > update for the Fail2Ban package in wheezy.  Especially if you are using
> > postfix, cyrus imap, courier smtp, exim, or lighttpd.  Unfortunately amount 
> > of
> > changes to those filters definitions was quite large, and I have tried to 
> > do my
> > best to verify their correct operation on sample log lines we have in recent
> > Fail2Ban, but I could have missed something obvious since I have no working
> > deployments of postfix etc.

Cheers
Tomasz 

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature


Re: RFC: fail2ban wheezy security update

2014-07-08 Thread Tomasz Ciolek

On Tue, Jul 08, 2014 at 08:51:09AM +0100, Adam D. Barratt wrote:
> On 2014-07-08 8:13, Tomasz Ciolek wrote:
> >Perhaps the best way is to sumbmit these patches to the Debian
> >fail2ban maintainer?
> 
> You mean the person who started this thread? :)
> 

Duh. having a fail. :)

Tomasz

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature


Re: Is this a hacking attempt?

2015-01-20 Thread Tomasz Ciolek
 Hi there


On Tue, Jan 20, 2015 at 12:40:07PM +0100, Marko Randjelovic wrote:
> I was running Wheezy Iceweasel with vanilla 3.14 kernel with grsec. I
> tried to play video on YouTube with gnash plugin but Iceweasel crashed
> with alike messages
> 
> execution attempt in ...
> Terminating task /usr/lib/iceweasel/iceweasel
> 
> Full log can be found on http://paste.lisp.org/+343V

I could not find DNS entries for the pastebin... 

But do you get similar issues withthe flashplugin-nonfree pakage? 

Cheers
Tomasz Ciolek

-- 
Tomasz M. Ciolek
***
 tmc at vandradlabs dot com dot au 
***
   GPG Key ID:  0x41C4C2F0
   GPG Key Fingerprint: 3883 B308 8256 2246 D3ED  A1FF 3A1D 0EAD 41C4 C2F0
   Key available on good key-servers
***


signature.asc
Description: Digital signature