Re: BIND exploited ?

2002-01-06 Thread Jason Lim
> > I have to ask what you would do if your server is a file server with > > lots of big, expensive drives where a company might not be able to > > afford replacing them all? Would they be happy with backups (keeping > > in mind that any tools used to backup the server might no longer be > > trus

RE: BIND exploited ? -UPDATE

2002-01-06 Thread Jeremy L. Gaddis
You dumbass. Everybody knows you don't try to fix a compromised machine. You take it in stride, wipe the drives and start all over from a clean install. j. -- Jeremy L. Gaddis <[EMAIL PROTECTED]> -Original Message- From: Ted Knab [mailto:[EMAIL PROTECTED]]On Behalf Of Thedore Knab

Centralized ISP Admin Package

2002-01-06 Thread Gene Grimm
I haven't been able to gleen much about Webmin yet as to whether it can support automating common ISP activities distributed among multiple servers. Does Webmin or any other package provide a means of logging onto a centralized web site (for ISP employees only) to add radius user accounts, P

RE: BIND exploited ? -UPDATE

2002-01-06 Thread Martin WHEELER
On Sat, 5 Jan 2002, Jeremy L. Gaddis wrote: > You dumbass. Everybody knows you don't try to fix a compromised > machine. You take it in stride, wipe the drives and start all > over from a clean install. Would you mind terribly not airing your oh-so-superior views in public? With such unbridled

Re: BIND exploited ?

2002-01-06 Thread Rory Irvine
> Good point! Having never dealt with the fuzz after being compromised, > I have to ask what you would do if your server is a file server with > lots of big, expensive drives where a company might not be able to > afford replacing them all? Would they be happy with backups (keeping > in mind th

Re: BIND exploited ? -UPDATE

2002-01-06 Thread Joachim Wieland
On Sat, Jan 05, 2002 at 01:43:24AM -0500, Thedore Knab wrote: > Starting nmap V. 2.54BETA25 ( www.insecure.org/nmap/ ) > Interesting ports on dns1.mywork.edu : > (The 1540 ports scanned but not shown below are in state: closed) ^^ You seem to have only scanned your well-known ports

Re: BIND exploited ?

2002-01-06 Thread Russell Coker
On Sun, 6 Jan 2002 04:08, Jason Lim wrote: > From my experience, police like data untampered and in exactly the same > form and such when the intrusion occurred. That means the exact same > disks, not a tape backup or something. Sometimes backups can miss stuff, > or as mentione previously, the ba

Re: BIND exploited ? -UPDATE #2

2002-01-06 Thread Thedore Knab
How does this sound ? The system has been rebuilt. It is running Bind 9.2 chroot version on RH 7.2. Someone else built it. I prefer Debian or OpenBSD. I will add tripwire and chkroot kit to run as a cron job. The harddrives will be saved for further investigation at a later date. Since the har

[OT] help with filtering chars using reg exp in PHP

2002-01-06 Thread sib
hello all, for the life of me i cant figure out the reg exp PHP manual, can someone please help me with ereg_replace() or preg_replace() in PHP. i have a string wherein i want to replace all occurences of characters outside of "a-z0-9" with nothing. tia, sib ---

Re: Best way to duplicate HDs--talk more about rsync+ssh system

2002-01-06 Thread Patrick Hsieh
> 3) Add this to authorized_keys for the above account, specifying the > command that logins with this key are allowed to run. See command="" in > sshd(1). I can't find the document about this section, can you show me some reference or examples? Many thanks. -- Patrick Hsieh <[EMAIL PROTECTED]>

chroot debian environments

2002-01-06 Thread Kevin Littlejohn
Heya, I've got a project coming up to create a chroot'ed environment, using the grsecurity patches for added security, that provides a separate encapsulated "virtual machine" for each user or group of users. I want to build the environment the users get chroot'ed into using debian package tools.

Re: chroot debian environments

2002-01-06 Thread Jacob Elder
On Mon, Jan 07, 2002 at 03:48:25PM +1100, Kevin Littlejohn wrote: > What I'm wondering is, what's the best way to start this process? > Assuming I have a partition set aside (which will be mounted read-only) > to act as the root filesystem for the chroot cage, how do I get the > basic file layout

Re: Best way to duplicate HDs--talk more about rsync+ssh system

2002-01-06 Thread Jeff Waugh
> > 3) Add this to authorized_keys for the above account, specifying the > > command that logins with this key are allowed to run. See command="" in > > sshd(1). > > I can't find the document about this section, can you show me > some reference or examples? Many thanks. man sshd, down the bott

Re: Best way to duplicate HDs

2002-01-06 Thread Patrick Hsieh
> On Tue, Jan 01, 2002 at 08:39:39AM -0500, Keith Elder wrote: > > This brings up a question. How do you rsync something but keep the > > ownership and permissions the same. I am pulling data off site nightly > > and that works, but the permissions are all screwed up. > > rsync -avxrP --delete

Re: Best way to duplicate HDs

2002-01-06 Thread Ted Deppner
On Mon, Jan 07, 2002 at 03:03:12PM +0800, Patrick Hsieh wrote: > > - obviously this doesn't preclude a bad guy checking out > > backup-server:backups/otherhostname (use ssh keys, and invoke cmd="cd > > backups/hostname; rsync with whatever daemon options" will limit that) > Now I know ho

Re: BIND exploited ?

2002-01-06 Thread Jason Lim
> > I have to ask what you would do if your server is a file server with > > lots of big, expensive drives where a company might not be able to > > afford replacing them all? Would they be happy with backups (keeping > > in mind that any tools used to backup the server might no longer be > > trust

RE: BIND exploited ? -UPDATE

2002-01-06 Thread Jeremy L. Gaddis
You dumbass. Everybody knows you don't try to fix a compromised machine. You take it in stride, wipe the drives and start all over from a clean install. j. -- Jeremy L. Gaddis <[EMAIL PROTECTED]> -Original Message- From: Ted Knab [mailto:[EMAIL PROTECTED] Behalf Of Thedore Knab Sen

Centralized ISP Admin Package

2002-01-06 Thread Gene Grimm
I haven't been able to gleen much about Webmin yet as to whether it can support automating common ISP activities distributed among multiple servers. Does Webmin or any other package provide a means of logging onto a centralized web site (for ISP employees only) to add radius user accounts, P

RE: BIND exploited ? -UPDATE

2002-01-06 Thread Martin WHEELER
On Sat, 5 Jan 2002, Jeremy L. Gaddis wrote: > You dumbass. Everybody knows you don't try to fix a compromised > machine. You take it in stride, wipe the drives and start all > over from a clean install. Would you mind terribly not airing your oh-so-superior views in public? With such unbridled

Re: BIND exploited ?

2002-01-06 Thread Rory Irvine
> Good point! Having never dealt with the fuzz after being compromised, > I have to ask what you would do if your server is a file server with > lots of big, expensive drives where a company might not be able to > afford replacing them all? Would they be happy with backups (keeping > in mind tha

Re: BIND exploited ? -UPDATE

2002-01-06 Thread Joachim Wieland
On Sat, Jan 05, 2002 at 01:43:24AM -0500, Thedore Knab wrote: > Starting nmap V. 2.54BETA25 ( www.insecure.org/nmap/ ) > Interesting ports on dns1.mywork.edu : > (The 1540 ports scanned but not shown below are in state: closed) ^^ You seem to have only scanned your well-known ports?

Re: BIND exploited ?

2002-01-06 Thread Russell Coker
On Sun, 6 Jan 2002 04:08, Jason Lim wrote: > From my experience, police like data untampered and in exactly the same > form and such when the intrusion occurred. That means the exact same > disks, not a tape backup or something. Sometimes backups can miss stuff, > or as mentione previously, the bac

Re: BIND exploited ? -UPDATE #2

2002-01-06 Thread Thedore Knab
How does this sound ? The system has been rebuilt. It is running Bind 9.2 chroot version on RH 7.2. Someone else built it. I prefer Debian or OpenBSD. I will add tripwire and chkroot kit to run as a cron job. The harddrives will be saved for further investigation at a later date. Since the hard

[OT] help with filtering chars using reg exp in PHP

2002-01-06 Thread sib
hello all, for the life of me i cant figure out the reg exp PHP manual, can someone please help me with ereg_replace() or preg_replace() in PHP. i have a string wherein i want to replace all occurences of characters outside of "a-z0-9" with nothing. tia, sib

Re: Best way to duplicate HDs--talk more about rsync+ssh system

2002-01-06 Thread Patrick Hsieh
> 3) Add this to authorized_keys for the above account, specifying the > command that logins with this key are allowed to run. See command="" in > sshd(1). I can't find the document about this section, can you show me some reference or examples? Many thanks. -- Patrick Hsieh <[EMAIL PROTECTED]>

chroot debian environments

2002-01-06 Thread Kevin Littlejohn
Heya, I've got a project coming up to create a chroot'ed environment, using the grsecurity patches for added security, that provides a separate encapsulated "virtual machine" for each user or group of users. I want to build the environment the users get chroot'ed into using debian package tools.

Re: chroot debian environments

2002-01-06 Thread Jacob Elder
On Mon, Jan 07, 2002 at 03:48:25PM +1100, Kevin Littlejohn wrote: > What I'm wondering is, what's the best way to start this process? > Assuming I have a partition set aside (which will be mounted read-only) > to act as the root filesystem for the chroot cage, how do I get the > basic file layout,