Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Alex Milojkovic
There is a concept called dynamic firewall i am working on that should eliminate any brute force attempts. If you think about it, if you know someone is trying to break in there is no need to give them access to the server any more. So after a hundred wrong passwords you cut them off. Reindl H

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Johnny Hughes
On 12/30/2011 03:55 AM, Alex Milojkovic wrote: > There is a concept called dynamic firewall i am working on that should > eliminate any brute force attempts. If you think about it, if you know > someone is trying to break in there is no need to give them access to the > server any more. So after

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread 夜神 岩男
On 12/30/2011 02:33 AM, Ljubomir Ljubojevic wrote: > I like to use serial numbers from MB, HDD, etc., as passwords. I never > use normal words for my passwords, and few other users (with ssh/cli > access) are carefully checked for their passwords. > > If this formula is true "(1/2 . 2 ^ 54 . 1s / 1

[CentOS] Need help in writing a shell/bash script

2011-12-30 Thread ankush grover
Hi Friends, I am trying to write a shell script which can merge the 2 columns into 3rd one on Centos 5. The file is very long around 31200 rows having around 1370 unique groups and around 12000 unique user-names. The 1st column is the groupname and then 2nd column is the user-name. 1st Column (Gr

Re: [CentOS] UC Need help in writing a shell/bash script

2011-12-30 Thread Rushton Martin
I knocked up the enclosed under Cygwin: #!/bin/sh ( cat

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread Edo
Hi, On Friday, December 30, 2011 at 9:00 PM, ankush grover wrote: > Hi Friends, > > I am trying to write a shell script which can merge the 2 columns into > 3rd one on Centos 5. The file is very long around 31200 rows having > around 1370 unique groups and around 12000 unique user-names. > The

Re: [CentOS] UC Need help in writing a shell/bash script

2011-12-30 Thread m . roth
Rushton Martin wrote: > I knocked up the enclosed under Cygwin: > > #!/bin/sh > ( > cat < admin ankush > admin amit > powerusers dinesh > powerusers jitendra

Re: [CentOS] UC UC Need help in writing a shell/bash script

2011-12-30 Thread Rushton Martin
Demonstration purposes only. I wanted to show the data going is was the user's data as described. The awk script is the key, the cat and sort are merely decoration. Martin Rushton HPC System Manager, Weapons Technologies Tel: 01959 514777, Mobile: 07939 219057 email: jmrush...@qinetiq.com www.

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Wednesday, December 28, 2011 10:38:30 PM Craig White wrote: > the top priority was to get the machine back online? > > Seems to me that you threw away the only opportunity to find out what > you did wrong and to correct that so it doesn't happen again. You are > left to endlessly suffer the end

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Johnny Hughes
On 12/30/2011 09:15 AM, Lamar Owen wrote: > On Wednesday, December 28, 2011 10:38:30 PM Craig White wrote: >> the top priority was to get the machine back online? >> >> Seems to me that you threw away the only opportunity to find out what >> you did wrong and to correct that so it doesn't happen ag

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Tuesday, December 27, 2011 10:13:12 PM Bennett Haselton wrote: > Roughly what percent of the time is there such an unpatched exploit in the > wild, so that the machine can be hacked by someone keeping up with the > exploits? While I did reply elsewhere in the thread, I want to address this sp

[CentOS] Checkinstall rpm for CentOS-6 x86_64?

2011-12-30 Thread James B. Byrne
I cannot seem to find a checkinstall rpm package for CentOS-6 or one for x86_64 more recent than CentOS4. When I try to build it locally from the most recent source I can find, c.2006, I get build errors having to do with size constants either missing or improperly defined. Does anyone have a so

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Thursday, December 29, 2011 12:33:41 PM Ljubomir Ljubojevic wrote: > If you use denyhosts or fail2ban, attacker needs 10,000 attack PC's that > never attacked any denyhosts or fail2ban server in recent time. That would be a very small botnet. And with gamers out there with CUDA-capable GPU's

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Friday, December 30, 2011 10:24:15 AM Johnny Hughes wrote: > Agree with this. At the very least, some kind of image (dd) of the > original disk for further study even if you have to get the machine back > on line and you don't have a failover machine. Speaking of dd, ddrescue in my experience

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread 夜神 岩男
On 12/30/2011 09:00 PM, ankush grover wrote: > Hi Friends, > > I am trying to write a shell script which can merge the 2 columns into > 3rd one on Centos 5. The file is very long around 31200 rows having > around 1370 unique groups and around 12000 unique user-names. > The 1st column is the groupna

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread m . roth
Lamar Owen wrote: > On Thursday, December 29, 2011 12:33:41 PM Ljubomir Ljubojevic wrote: >> If you use denyhosts or fail2ban, attacker needs 10,000 attack PC's that >> never attacked any denyhosts or fail2ban server in recent time. > > That would be a very small botnet. > > And with gamers out the

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Marko Vojinovic
On Friday 30 December 2011 19:40:55 夜神 岩男 wrote: [snip] > We can start a 10,000 computer botnet (or, more realistically, a 10m > computer botnet these days, and this is a technique used right now) > working on the problem of assembling a new index table that orders and > assigns every possible val

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread m . roth
Hey, supergiantpotato (and btw, this list is plain text, not unicode, and most of us don't read Japanese...), 夜神 岩男 wrote: > On 12/30/2011 09:00 PM, ankush grover wrote: >> >> I am trying to write a shell script which can merge the 2 columns into >> 3rd one on Centos 5. The file is very

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Craig White
On Dec 30, 2011, at 8:24 AM, Lamar Owen wrote: > On Tuesday, December 27, 2011 10:13:12 PM Bennett Haselton wrote: >> Roughly what percent of the time is there such an unpatched exploit in the >> wild, so that the machine can be hacked by someone keeping up with the >> exploits? > > While I di

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread Craig White
looked like English to me... On Dec 30, 2011, at 9:41 AM, m.r...@5-cent.us wrote: > Hey, supergiantpotato (and btw, this list is plain text, not unicode, and > most of us don't read Japanese...), > > 夜神 岩男 wrote: >> On 12/30/2011 09:00 PM, ankush grover wrote: >>> >>> I am trying to w

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Lamar Owen
On Friday, December 30, 2011 11:19:46 AM Marko Vojinovic wrote: > You are basically saying that, given enough resources, you can precalculate > all hashes for all possible passwords in advance. > Can the same be said for keys? Given enough resources, you could precalculate > all possible public/

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread m . roth
Craig White wrote: > looked like English to me... > > On Dec 30, 2011, at 9:41 AM, m.r...@5-cent.us wrote: > >> Hey, supergiantpotato (and btw, this list is plain text, not unicode, >> and most of us don't read Japanese...), >> >> 夜神 岩男 wrote: ^^ doesn't look like English,

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread Craig White
On Dec 30, 2011, at 9:52 AM, m.r...@5-cent.us wrote: > Craig White wrote: >> looked like English to me... >> >> On Dec 30, 2011, at 9:41 AM, m.r...@5-cent.us wrote: >> >>> Hey, supergiantpotato (and btw, this list is plain text, not unicode, >>> and most of us don't read Japanese...), >>> >>>

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread 夜神 岩男
On 12/31/2011 01:41 AM, m.r...@5-cent.us wrote: > Hey, supergiantpotato (and btw, this list is plain text, not unicode, and > most of us don't read Japanese...), Thanks for the info > This is really complicated and fiddly. Look at the one awk script that was > posted, which is *far* simpler, and

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread 夜神 岩男
On 12/31/2011 01:19 AM, Marko Vojinovic wrote: > > On Friday 30 December 2011 19:40:55 夜神 岩男 wrote: > [snip] >> We can start a 10,000 computer botnet (or, more realistically, a 10m >> computer botnet these days, and this is a technique used right now) >> working on the problem of assembling a new i

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread 夜神 岩男
On 12/31/2011 01:56 AM, Craig White wrote: > > On Dec 30, 2011, at 9:52 AM, m.r...@5-cent.us wrote: > >> Craig White wrote: >>> looked like English to me... >>> >>> On Dec 30, 2011, at 9:41 AM, m.r...@5-cent.us wrote: >>> Hey, supergiantpotato (and btw, this list is plain text, not unicode, >>

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread Scott Robbins
On Fri, Dec 30, 2011 at 11:52:21AM -0500, m.r...@5-cent.us wrote: > Craig White wrote: > > looked like English to me... > > > > On Dec 30, 2011, at 9:41 AM, m.r...@5-cent.us wrote: > > > >> Hey, supergiantpotato (and btw, this list is plain text, not unicode, > >> and most of us don't read Japane

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread Craig White
On Dec 30, 2011, at 10:19 AM, Scott Robbins wrote: > On Fri, Dec 30, 2011 at 11:52:21AM -0500, m.r...@5-cent.us wrote: >> Craig White wrote: > > >>> looked like English to me... >>> >>> On Dec 30, 2011, at 9:41 AM, m.r...@5-cent.us wrote: >>> Hey, supergiantpotato (and btw, this list is

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread Marc Deop
On Friday 30 December 2011 11:41:47 m.r...@5-cent.us wrote: > Hey, supergiantpotato (and btw, this list is plain text, not unicode, and > most of us don't read Japanese...), You are not using "plain text" and "unicode" correctly here. I've read pleasantly his emails in *plain text* encoded in *AS

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread m . roth
夜神 岩男 wrote: > On 12/31/2011 01:56 AM, Craig White wrote: >> On Dec 30, 2011, at 9:52 AM, m.r...@5-cent.us wrote: >>> Craig White wrote: looked like English to me... On Dec 30, 2011, at 9:41 AM, m.r...@5-cent.us wrote: > Hey, supergiantpotato (and btw, this list is plai

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread Les Mikesell
On Fri, Dec 30, 2011 at 6:00 AM, ankush grover wrote: > Hi Friends, > > I am trying to write a shell script which can merge the 2 columns into > 3rd one on Centos 5. The file is very long around 31200 rows having > around 1370 unique groups and around 12000 unique user-names. > The 1st column is t

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread John R Pierce
On 12/30/11 9:58 AM, Les Mikesell wrote: > Here's a perl approach: which, unlike all the other versions, doesn't require the data be pre-sorted, by virtue of adding all the tuples to a hash. I don't even think that sort in the output loop is required, unless you want the groups output in alph

Re: [CentOS] Need help in writing a shell/bash script

2011-12-30 Thread m . roth
John R Pierce wrote: > On 12/30/11 9:58 AM, Les Mikesell wrote: >> Here's a perl approach: > > which, unlike all the other versions, doesn't require the data be > pre-sorted, by virtue of adding all the tuples to a hash. I don't even > think that sort in the output loop is required, unless you wa

Re: [CentOS] Checkinstall rpm for CentOS-6 x86_64?

2011-12-30 Thread Karanbir Singh
On 12/30/2011 03:34 PM, James B. Byrne wrote: > Does anyone have a source for an rpm of this package that > runs on CentOS-6_x86_64 or can recommend a replacement for > it? > > consider using fpm instead ? it kind of address's the same problem in a different way. -- Karanbir Singh +44-207-0999

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Leonard den Ottolander
Reinl, On Thu, 2011-12-29 at 15:28 +0100, Reindl Harald wrote: > why do you not tell this the idiot who is argumentating against kyes > and thinks using password-login is smart? I don't like your tone. I'm not sure if it's me or Bennett you are calling an idiot or both, but in any case you should

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread m . roth
Leonard den Ottolander wrote: > Reinl, > > On Thu, 2011-12-29 at 15:28 +0100, Reindl Harald wrote: >> why do you not tell this the idiot who is argumentating against kyes >> and thinks using password-login is smart? > > I don't like your tone. I'm not sure if it's me or Bennett you are > calling an

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Ljubomir Ljubojevic
On 12/30/2011 05:47 PM, Craig White wrote: > > to reiterate my thoughts... I still don't understand the logic of the list > indulging the OP's rampant speculation of various causes when his first > action was to eliminate all possibility to find out what actually happened. > > An apt analogy is t

Re: [CentOS] CentOS 6 x86_64 can't detect raid 10

2011-12-30 Thread Ljubomir Ljubojevic
On 12/30/2011 12:46 AM, Alexander Dalloz wrote: > Either get a real RAID controller which does hardware RAID or use > CentOS's software raid function. +1. For Linux/CentOS/mdadm RAID 10 use "far" setting to get better (2x ??) read speed on mirroring. -- Ljubomir Ljubojevic (Love is in the Air)

[CentOS] CentOS 6 x86_64 can't detect raid 10

2011-12-30 Thread David
Dear All, I just got a new server with the following specifications: motherboard : Intel S5500BC CPU : Xeon Quad Core 2.6Ghz RAM : 8GB HDD : 4 x 2TB SATA with configured raid 10 using raid embedded server. The problem is the centos installer can't detect raid virtual disk

Re: [CentOS] CentOS 6 x86_64 can't detect raid 10

2011-12-30 Thread Rob Kampen
On 12/31/2011 04:31 PM, David wrote: > Dear All, > > I just got a new server with the following specifications: > motherboard : Intel S5500BC > CPU : Xeon Quad Core 2.6Ghz > RAM : 8GB > HDD : 4 x 2TB SATA with configured raid 10 using raid embedded > server. > > The problem

Re: [CentOS] CentOS 6 x86_64 can't detect raid 10

2011-12-30 Thread Ken godee
> Dear All, > > I just got a new server with the following specifications: > motherboard : Intel S5500BC > CPU : Xeon Quad Core 2.6Ghz > RAM : 8GB > HDD : 4 x 2TB SATA with configured raid 10 using raid embedded > server. > > The problem is the centos installer can't detect

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread Alex Milojkovic
I think the best password policy is the one you've never told anyone and never posted on a public mailing list. How many of you out there know of cases where administrators' passwords were compromised by brute force? Can we take a count of that? I believe in passwords. I don't believe in PKI.

Re: [CentOS] what percent of time are there unpatched exploits against default config?

2011-12-30 Thread John R Pierce
On 12/30/11 9:02 PM, Alex Milojkovic wrote: > I believe in passwords. I don't believe in PKI. > It's a lot more likely that I will forget my laptop somewhere, or that > someone will steal my usb key than that someone will guess my password and > have opportunities to try it. you're supposed to p