Hi,
Would it be possible for the latest version of OpenSSH (2.5.1 in
unstable) to be back-ported to potato and added to proposed updates
once it enters testing.
I propose this due to the recent set of ssh vulnerabilities most (all?)
of which didn't apply to 2.3.0, and the concerns over the funda
Hi,
and thanks to everybody for all the useful information I have received. :)
One good thing about using SSH2.4 in stead of OpenSSH is that if someone
installed an RSA key in my .ssh/authorized_keys file, it would be of no
use :) Besides, I have heard that the SSH1.1 protocol is unsecure, and
th
[Note: This is Cc'd to debian-devel and debian-security because of the
discussion regarding RMS' su diatribe; subscribers to these lists
might find it interesting, scroll down past the Java stuff if you are,
and feel free to ignore this message if you're not. Please don't flame
me. I'm thin-skinne
To me that doesn't look like misconfigured DNS at all. To me it looks like
sombodies trying to find mailservers that will allow them to relay mail,
or they are trying to relay mail from a bogus domain (which is why you
can't do a reverse lookup nor 'DIG' info on the remote machine). Its a
common pr
To me that doesn't look like misconfigured DNS at all. To me it looks like
sombodies trying to find mailservers that will allow them to relay mail,
or they are trying to relay mail from a bogus domain (which is why you
can't do a reverse lookup nor 'DIG' info on the remote machine). Its a
common p
On Thu, Mar 01, 2001 at 09:32:19AM +0100, Runar Bell wrote:
> 1) I noticed that somebody had logged in to my computer using my username.
> I can't see how they could have discovered my password (7 letters,
>
> 2) When inspecting /var/log/messages I noticed quite a lot of attempts to
> send a buff
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Richard" == Richard <[EMAIL PROTECTED]> writes:
Richard> Use Openssh, opensource leeds to more secure systems and I
Richard> belive it has less security bug's. (just keep updated)
Not true. Open source has the *potential* to be more secure (
On Thu, Mar 01, 2001 at 09:32:19AM +0100, Runar Bell wrote:
> 1) I noticed that somebody had logged in to my computer using my username.
> I can't see how they could have discovered my password (7 letters,
>
> 2) When inspecting /var/log/messages I noticed quite a lot of attempts to
> send a buf
On Thursday 01 March 2001 14:08, Maarten Vink wrote:
> Yes it does, security.debian.org is located somewhere outside the US and
> also carries non-US updates.
security.debian.org is located in The Netherlands at the Rijks Universiteit
Leiden to be correctly.
Hans
On Thu, Mar 01, 2001 at 05:07:43AM +, Jacob Meuser wrote:
>
> My potatos have
> deb http://security.debian.org stable/updates main contrib non-free
> in /etc/apt/sources.list
> That was in there by default, I just uncommented it. (it was there in r0 too,
it was there but commented out by d
On Fri, Feb 02, 2001 at 04:27:52PM +0300, Vasily Korytov wrote:
> Hello Magus,
>
> > I have a question about /etc/passwd...
>
> > I typically go thru and put a * in all accounts except for 'root' and change
> > the shell to '/bin/false' when I first setup a box, to make sure the account
> > canno
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Richard" == Richard <[EMAIL PROTECTED]> writes:
Richard> Use Openssh, opensource leeds to more secure systems and I
Richard> belive it has less security bug's. (just keep updated)
Not true. Open source has the *potential* to be more secure
On Thursday 01 March 2001 14:08, Maarten Vink wrote:
> Yes it does, security.debian.org is located somewhere outside the US and
> also carries non-US updates.
security.debian.org is located in The Netherlands at the Rijks Universiteit
Leiden to be correctly.
Hans
--
To UNSUBSCRIBE, email to
Hello Magus,
> I have a question about /etc/passwd...
> I typically go thru and put a * in all accounts except for 'root' and change
> the shell to '/bin/false' when I first setup a box, to make sure the account
> cannot be logged into. Is there a specific reason why this is not done? Are
> there
On Thu, Mar 01, 2001 at 05:07:43AM +, Jacob Meuser wrote:
>
> My potatos have
> deb http://security.debian.org stable/updates main contrib non-free
> in /etc/apt/sources.list
> That was in there by default, I just uncommented it. (it was there in r0 too,
it was there but commented out by
On Fri, Feb 02, 2001 at 04:27:52PM +0300, Vasily Korytov wrote:
> Hello Magus,
>
> > I have a question about /etc/passwd...
>
> > I typically go thru and put a * in all accounts except for 'root' and change
> > the shell to '/bin/false' when I first setup a box, to make sure the account
> > cann
Jacob Meuser wrote:
>
>
> My potatos have
> deb http://security.debian.org stable/updates main contrib non-free
> in /etc/apt/sources.list
> That was in there by default, I just uncommented it. (it was there in r0 too,
> by the way). I never thought about it, but that doesn't cover the non-US
>
On Wed, Feb 28, 2001 at 11:51:32PM -0900, Ethan Benson wrote:
>
> the first thing you should add to a newly installed debian system is:
>
> ## security updates
> deb http://security.debian.org/debian-security/ potato/updates main contrib
> deb http://security.debian.org/debian-non-US/ potato/non-
Hi,
On Thu, 1 Mar 2001, Runar Bell wrote:
> Hi,
>
> I installed potato three weeks ago, only adding debian-packages with
> dselect and apt-get. I didn't add much either. The problem was that:
Did you put security.debian.org in /etc/apt/sources.list ?
> 1) I noticed that somebody had logged i
Hello Magus,
> I have a question about /etc/passwd...
> I typically go thru and put a * in all accounts except for 'root' and change
> the shell to '/bin/false' when I first setup a box, to make sure the account
> cannot be logged into. Is there a specific reason why this is not done? Are
> ther
Jacob Meuser wrote:
>
>
> My potatos have
> deb http://security.debian.org stable/updates main contrib non-free
> in /etc/apt/sources.list
> That was in there by default, I just uncommented it. (it was there in r0 too,
> by the way). I never thought about it, but that doesn't cover the non-US
>
On Wed, Feb 28, 2001 at 11:51:32PM -0900, Ethan Benson wrote:
>
> the first thing you should add to a newly installed debian system is:
>
> ## security updates
> deb http://security.debian.org/debian-security/ potato/updates main contrib
> deb http://security.debian.org/debian-non-US/ potato/non
Hi,
On Thu, 1 Mar 2001, Runar Bell wrote:
> Hi,
>
> I installed potato three weeks ago, only adding debian-packages with
> dselect and apt-get. I didn't add much either. The problem was that:
Did you put security.debian.org in /etc/apt/sources.list ?
> 1) I noticed that somebody had logged
On Wed, Feb 28, 2001 at 10:14:05PM -0800, Jamie Heilman wrote:
> Romanenko M.A. wrote:
>
> > Am I right, that sendmail's check_mail rejects connection because there
> > are no A-record for tgngu.tyumen.ru in other side DNS configuration?
>
> Yes, now if you believe this is a desirable configurati
On Thu, Mar 01, 2001 at 09:32:19AM +0100, Runar Bell wrote:
>
> 2) When inspecting /var/log/messages I noticed quite a lot of attempts to
> send a buffer overflow (or something like that) on the port running
> rcp.statd. Is there some security hole there I am not aware of? I have
> removed portmap
Hi,
I installed potato three weeks ago, only adding debian-packages with
dselect and apt-get. I didn't add much either. The problem was that:
1) I noticed that somebody had logged in to my computer using my username.
I can't see how they could have discovered my password (7 letters,
containing bo
I suggest using ipchains/iptables to block any other input to the machine
itself (except for of course for the port you want forwarded.)
Remember, attacks can still get to the web server that the packets are getting
forwarded to. (granted, via cgi cuts down on allot of the standard
hack-in-th
On Wed, Feb 28, 2001 at 10:14:05PM -0800, Jamie Heilman wrote:
> Romanenko M.A. wrote:
>
> > Am I right, that sendmail's check_mail rejects connection because there
> > are no A-record for tgngu.tyumen.ru in other side DNS configuration?
>
> Yes, now if you believe this is a desirable configurat
On Thu, Mar 01, 2001 at 09:32:19AM +0100, Runar Bell wrote:
>
> 2) When inspecting /var/log/messages I noticed quite a lot of attempts to
> send a buffer overflow (or something like that) on the port running
> rcp.statd. Is there some security hole there I am not aware of? I have
> removed portma
Hi,
I installed potato three weeks ago, only adding debian-packages with
dselect and apt-get. I didn't add much either. The problem was that:
1) I noticed that somebody had logged in to my computer using my username.
I can't see how they could have discovered my password (7 letters,
containing b
Romanenko M.A. wrote:
> Am I right, that sendmail's check_mail rejects connection because there
> are no A-record for tgngu.tyumen.ru in other side DNS configuration?
Yes, now if you believe this is a desirable configuration or not is another
matter, but that is probably what is happening. It mi
Someone has been failing to connect to my sendmail for several days. My syslog
is full with error messages:
[...]
Mar 1 08:29:08 lee sendmail[1042]: f213T8o01042: ruleset=check_mail,
arg1=<[EMAIL PROTECTED]>, relay=server.tgngu.tyumen.ru [194.67.48.89] (may be
forged), reject=451 4.1.8 <[EMAIL
32 matches
Mail list logo