Re: CanSecWest/core06 Vancouver April 3-7

2006-03-19 Thread paul dansing
This conference currently costs $1546 USD!  :-(

what moneybags loser is going to pay up so much just to go
to a conference?

buy yourself a nice computer, or hell, donate the money to
openbsd.org instead! :-D

drop a zero or two and it would be worth the trip


Tuesday, March 7, 2006, 8:45:30 PM, you wrote:

> The call for papers is now closed and the proposals have been reviewed
> for the CanSecWest/core06 Applied Technical Security Conference held
> on April 5-7 2006 at the Mariott Renaissance Harbourside in Vancouver,
> B.C. Canada.

> The selected submissions are :

>An hour of Rap and Comedy about SAP - Steve Lord
>Next Generation Sebek - Edward Balas - Indiana University
>RF Bugsweeping - Tim Johnson - Technical Security Consultants Inc.
>Magstripe Madness - Major Malfunction
>Metasploitation (and a dash of IPS) - HD Moore - BreakingPoint
>Carrier VoIP Security - Nico Fischbach - COLT
>Attacking VoIP Networks - Hendrik Scholz - Freenet Cityline GmbH
>Security Issues Related to Pentium System Management Mode - Looc Duflot
>Advancements in Anonymous eAnnoyance - Christopher Abad - Cloudmark
>Real Time Threat Mitigation Techniques - Josh Ryder - University of Alberta
>Stunt Profiling: Securing a System While You Wait - Crispin Cowan - Novell
>Visualizing Source Code for Auditing - Lisa Thalheim
>Attacking Web Services - Alex Stamos, Scott Stender - iSEC Partners
>Reverse Engineering Microsoft Binaries - Alexander Sotirov - Determina
>Zen and the art of collecting and analyzing Malware - Fred Arbogast and
> Sascha Rommelfangen - S.E.S. Astra
>How to test an IPS - Renaud Bidou - RADWare
>Insiders View: Network Security Devices - Dennis Cox - BreakingPoint
>More on Uninitialized Variables - Halvar Flake
>Eric Byres - SCADA - BCIT
>Panel Discussion - Vulnerability Commercialization
>Terri Forslof, 3Com, Manager of Security Response
>Michael Sutton iDefense Labs, Director of iDEFENSE Labs
>Others TBA
>Vendor Elevator Focus Groups
> David Meltzer, Cambia
> Ofir Arkin, Insightix
> Others TBA
>Lightning Talks

> Some talks from the PacSec/core05 conference in Tokyo in November and
> the EUSecWest/core06 conference in London during February were highly
> rated and have been invited for encore presentations at CanSecWest:

>Attacking the IPv6 protocol suite - van Hauser - THC / n.runs GmbH
>Protecting the Infrastructure - Jim DeLeskie & Danny McPherson - Teleglobe,
> Arbor Networks

> Security Masters Dojo Courses 
> April 3-5 Vancouver

>Network Reconnaissance with Nmap 4 - Fyodor & Doug Hoyte
>Network Vulnerability Scanning: Turning Nessus into Metasploit - Renaud
> Deraison & Nicolas Pouvesle
>Reverse Engineering: Rapid Bug Discovery and Input Crafting - Halvar
>Assembly for Exploit Writing - Gerardo Richarte
>Advanced IDS Deployment and Optimization - Marty Roesch
>Advanced Honeypot Tactics - Thorsten Holz
>Mastering the network with Scapy - Philippe Biondi
>Securing your critical Cisco network infrastructure - Nico Fischbach
>Practical 802.11 WiFi (In)Security - Cidric Blancher
>Bluetooth Auditing and Technology - Martin Herfurt, Adam Laurie, Marcel
> Holtmann

> Conference registration on line can be found at: 
> http://cansecwest.com/register.html

> Security Masters Dojo Vancouver registration can be found at
> http://cansecwest.com/dojo.html

> cheers,
> --dr



is openbsd 3.9 php vulnerable? (Re[2]: [UPDATE] php5 to version 5.1.2 (IMPORTANT))

2006-05-02 Thread paul dansing
Hello,

Can someone please give a straight answer about these PHP security
holes?  OpenBSD 3.9 released yesterday had packages supporting:
php 4.4.1p0
php 5.0.5p0
are either of these vulnerable? if so, is someone going to release
updated packages (not just ports)?

the php 5.1.3 release:

The security issues resolved include the following:

 * Disallow certain characters in session names.
 * Fixed a buffer overflow inside the wordwrap() function.
 * Prevent jumps to parent directory via the 2nd parameter of the tempnam() 
function.
 * Enforce safe_mode for the source parameter of the copy() function.
 * Fixed cross-site scripting inside the phpinfo() function.
 * Fixed offset/length parameter validation inside the substr_compare() 
function.
 * Fixed a heap corruption inside the session extension.
 * Fixed a bug that would allow variable to survive unset().

thanks

Monday, May 1, 2006, 7:18:50 AM, you wrote:

> Hi.

> I haven't recieved a single test report, but I still get
> letters about asking for an update. How's that?
> This tarball also includes mysqli, fastcgi and hardened php support:
> http://gi.unideb.hu/~robert/php.tar.gz

> On (28/04/06 01:59), Robert Nagy wrote:
>> Hi.
>> 
>> Finally after fighting with pear I've managed to create a working update
>> for the php5 port.
>> The PHP guys have changed the installation method of pear to use some crappy
>> PHP_Archive. With this move they broke the installation of pear on serveral
>> linux distros (e.g. Frugalware), OpenDarwin and on OpenBSD of course.
>> Any other crappy package managements where they install files directly to 
>> ${LOCALBASE}


-- 
Best regards,
 paulmailto:[EMAIL PROTECTED]



exploit for openbsd 3.9 php 4.4.1p0/5.0.5p0

2006-05-02 Thread paul dansing
Is there some reason this issue is being ignored?  What, you people
need to see an exploit before you will even LOOK at it and answer
whether it is vuln?


> Can someone please give a straight answer about these PHP security
> holes?  OpenBSD 3.9 released yesterday had packages supporting:
> php 4.4.1p0
> php 5.0.5p0
> are either of these vulnerable? if so, is someone going to release
> updated packages (not just ports)?

> the php 5.1.3 release:

> The security issues resolved include the following:

>  * Disallow certain characters in session names.
>  * Fixed a buffer overflow inside the wordwrap() function.
>  * Prevent jumps to parent directory via the 2nd parameter of the tempnam() 
> function.
>  * Enforce safe_mode for the source parameter of the copy() function.
>  * Fixed cross-site scripting inside the phpinfo() function.
>  * Fixed offset/length parameter validation inside the substr_compare() 
> function.
>  * Fixed a heap corruption inside the session extension.
>  * Fixed a bug that would allow variable to survive unset().

> thanks

> Monday, May 1, 2006, 7:18:50 AM, you wrote:

>> Hi.

>> I haven't recieved a single test report, but I still get
>> letters about asking for an update. How's that?
>> This tarball also includes mysqli, fastcgi and hardened php support:
>> http://gi.unideb.hu/~robert/php.tar.gz

>> On (28/04/06 01:59), Robert Nagy wrote:
>>> Hi.
>>> 
>>> Finally after fighting with pear I've managed to create a working update
>>> for the php5 port.
>>> The PHP guys have changed the installation method of pear to use some crappy
>>> PHP_Archive. With this move they broke the installation of pear on serveral
>>> linux distros (e.g. Frugalware), OpenDarwin and on OpenBSD of course.
>>> Any other crappy package managements where they install files directly to 
>>> ${LOCALBASE}


-- 
Best regards,
 paulmailto:[EMAIL PROTECTED]



Re: exploit for openbsd 3.9 php 4.4.1p0/5.0.5p0

2006-05-03 Thread paul dansing
php is required in order to use many of the more mature web
applications such as forum software.  i run apache chroot, use
modsecurity, and use ipf to limit the www user.  a tight systrace
policy might help but not very much incremental gain.  everyone says
php is a security breach waiting to happen, so what else can i do if i
want to use these large apps without rewriting them from scratch in
another language?

also, i wish openbsd would release updated packages instead of just
the patches.  i would do it myself but who would trust a binary some
random guy posts? openbsd maintainers have to step up and do this. why
aren't you guys releasing package updates anyway?  when you post a
source patch on your errata page, take the few extra minutes to make a
updated package and post that as well please! :)

thanks



Re: The Apache Question (lighttp remote holes just fixed)

2006-02-07 Thread paul dansing
lighttpd just fixed a remote hole (case insensitive file systems) in
the CURRENT VERSION!

Does this inspire confidence?  I mean for fck sake, the version just
before they fixed %00 append bug!  Next thing they will discover
directory traversal. o_O  YEAH, yeah I want this FINE PIECE OF
SOFTWARE running on my production servers.  Bummer too, because the
hype had it sounded pretty cool until I realized how recent those
remote holes were :(

> I think you have way more chance to ever see lighttpd replace apache 1.3
> oppose to have apache 2.x for sure. I am not talking for the project 
> what so ever, but the archive make it very obvious that apache is not 
> going to go higher then where it is now. Plus lighttpd does have a BSD
> license, so that would be my bet. But don't expect that to change soon I
> think.

-- 
Best regards,
 paulmailto:[EMAIL PROTECTED]



Re: httpd question - solved (ProutDNS)

2006-02-07 Thread paul dansing
Hello Frank,

here ya go buddy: http://www.prout.be/ProutDNS/

http://www.prout.be/ProutDNS/download/ProutDNS-0.6.2.tar.gz

Tuesday, February 7, 2006, 10:54:33 AM, you wrote:

> At 04:17 AM 2/6/06, Alexander Farber wrote:

>>And there is also ipcheck.py
>>
>>On 2/6/06, Keith Richardson <[EMAIL PROTECTED]> wrote:
>> > This will handle the pesty case of your IP changing.
>> >
>> > 1. dyndns.org - get a free subdomain to map to your IP.
>> > 2. ddclient package - updates your DNS whenever your IP changes.


> Are there scripts available to do what dyndns.org does at the server 
> side?  I have an OpenBSD box with a static ip address hosting a few 
> domains.  I'd like to setup several machines as subdomains that are behind
> dynamic ip addresses.  I'd like to install something on the system with
> static ip address to provide the same service dyndns.org does, but cannot
> seem to find thos scripts.

> Frank  




-- 
Best regards,
 paulmailto:[EMAIL PROTECTED]