There is some discussion about possible /usr/bin/Mail buffer overflow.
The link is from http://lwn.net/2001/0308/security.php3
http://securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D82%26threads%3D1%26end%3D2001-03-03%26tid%3D166333%26fromthread%3D0%26start%3D2001-02-25%26
Las
This is really goofy. But I've been able to (at least in my case) narrow
the "problem" down to using Xircom cards. The 3Com card that I use in my
other Debian laptop works great (switching between the two demonstrates
this behavior as well, so it isn't the laptop, and the 3Com card is Cardbu
On Mon, 5 Mar 2001, Jaan Sarv wrote:
> > Also, paranoid network administrators might be a little upset by it, since
> > Linux sends out a frame indicating it is switching into (or out
> > of) promiscuous mode. This is possible evidence that you're running a
> > sniffer of some kind (such as snort)
This is really goofy. But I've been able to (at least in my case) narrow
the "problem" down to using Xircom cards. The 3Com card that I use in my
other Debian laptop works great (switching between the two demonstrates
this behavior as well, so it isn't the laptop, and the 3Com card is Cardbu
On Mon, 5 Mar 2001, Jaan Sarv wrote:
> > Also, paranoid network administrators might be a little upset by it, since
> > Linux sends out a frame indicating it is switching into (or out
> > of) promiscuous mode. This is possible evidence that you're running a
> > sniffer of some kind (such as snort
On Wed, Mar 07, 2001 at 05:04:17PM +0100, Niklas Höglund wrote:
> Anyone know where I can find a kernel patch that restricts users so..
> 'who' shows only the user himself
http://www.openwall.com/linux/
> 'netstat -a' only ports that root/the user owns
Openwall can set access rights for /proc
Hi!
Anyone know where I can find a kernel patch that restricts users so..
'who' shows only the user himself
'netstat -a' only ports that root/the user owns
'ls' only files that are owned by root/the user
??
//Niklas
The integrity of the files installed can be found in tripwire and aide, that
checksums the selected files into a database... its not the same you ask but can
be usefull...
On Wed, 7 Mar 2001, Alexander Reelsen wrote:
Hi
On Wed, Mar 07, 2001 at 03:34:14PM +0100, Jörgen Persson wro
Hi
On Wed, Mar 07, 2001 at 03:34:14PM +0100, Jörgen Persson wrote:
> the subject is clear enough... I'm looking for ''native'' support for
> checking the integrity of installed packets.
You might want to try the package 'debsums'. However those files are easy
to change, but perhaps it's a start i
Well,
the subject is clear enough... I'm looking for ''native'' support for
checking the integrity of installed packets.
Jörgen
On Wed, Mar 07, 2001 at 05:04:17PM +0100, Niklas Höglund wrote:
> Anyone know where I can find a kernel patch that restricts users so..
> 'who' shows only the user himself
http://www.openwall.com/linux/
> 'netstat -a' only ports that root/the user owns
Openwall can set access rights for /proc
Hi!
Anyone know where I can find a kernel patch that restricts users so..
'who' shows only the user himself
'netstat -a' only ports that root/the user owns
'ls' only files that are owned by root/the user
??
//Niklas
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe".
The integrity of the files installed can be found in tripwire and aide, that
checksums the selected files into a database... its not the same you ask but can
be usefull...
On Wed, 7 Mar 2001, Alexander Reelsen wrote:
Hi
On Wed, Mar 07, 2001 at 03:34:14PM +0100, Jörgen Persson wr
Hi
On Wed, Mar 07, 2001 at 03:34:14PM +0100, Jörgen Persson wrote:
> the subject is clear enough... I'm looking for ''native'' support for
> checking the integrity of installed packets.
You might want to try the package 'debsums'. However those files are easy
to change, but perhaps it's a start
Well,
the subject is clear enough... I'm looking for ''native'' support for
checking the integrity of installed packets.
Jörgen
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Wed, Mar 07, 2001 at 01:18:20AM +0100, [EMAIL PROTECTED] wrote:
> gcc -D__KERNEL__ -DMODULE -DLINUX -DEXPORT_SYMTAB -D__NO_VERSION__
> -I/usr/include -I. -O2 -pipe -DCONFIG_PROC_FS -DIANS -DIANS_BASE_VLAN_TAGGING
^^
That should probably be -I/usr/src/linux/include. You need to
leider hab ich das schon als root versucht zu installieren!
of course i tried it as root!
mfg
--
mei gehts mia heit wida guat
Sent through GMX FreeMail - http://www.gmx.net
hi
hmm..
> gcc -D__KERNEL__ -DMODULE -DLINUX -DEXPORT_SYMTAB -D__NO_VERSION__
> -I/usr/include -I. -O2 -pipe -DCONFIG_PROC_FS -DIANS -DIANS_BASE_VLAN_TAGGING
> -DIANS_BASE_VLAN_ID -c -o ans.o ans.c
> Assembler messages:
> FATAL: Can't create ans.o: Permission denied
> In file included from ans
leider hab ich das schon als root versucht zu installieren!
of course i tried it as root!
mfg
--
mei gehts mia heit wida guat
Sent through GMX FreeMail - http://www.gmx.net
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
19 matches
Mail list logo