Re: Party with porn stars

2001-12-21 Thread Heather
> Thus spake Karsten M. Self (kmself@ix.netcom.com): > > > There are two aspect to dealing with spam. One is filtering the > > messages. The other is reporting it. > > You can configure a threshold above which spamassassin will report spam > as well. I'm not sure of the details, though. >

Re: Party with porn stars

2001-12-21 Thread Justin R. Miller
Thus spake Karsten M. Self (kmself@ix.netcom.com): > There are two aspect to dealing with spam. One is filtering the > messages. The other is reporting it. You can configure a threshold above which spamassassin will report spam as well. I'm not sure of the details, though. > My filters pro

Re: Party with porn stars

2001-12-21 Thread Heather
> Thus spake Karsten M. Self ([EMAIL PROTECTED]): > > > There are two aspect to dealing with spam. One is filtering the > > messages. The other is reporting it. > > You can configure a threshold above which spamassassin will report spam > as well. I'm not sure of the details, though. > >

Re: Party with porn stars

2001-12-21 Thread Karsten M. Self
on Fri, Dec 21, 2001 at 10:15:14AM -0500, Justin R. Miller ([EMAIL PROTECTED]) wrote: > Thus spake Karsten M. Self (kmself@ix.netcom.com): > > > I've got a few systems for trapping spam. > > I've been quite happy with spamassassin. Feel free to check out my > writeup: > > http://codes

Re: Party with porn stars

2001-12-21 Thread Justin R. Miller
Thus spake Karsten M. Self ([EMAIL PROTECTED]): > There are two aspect to dealing with spam. One is filtering the > messages. The other is reporting it. You can configure a threshold above which spamassassin will report spam as well. I'm not sure of the details, though. > My filters provi

Re: Party with porn stars

2001-12-21 Thread Karsten M. Self
on Fri, Dec 21, 2001 at 10:15:14AM -0500, Justin R. Miller ([EMAIL PROTECTED]) wrote: > Thus spake Karsten M. Self ([EMAIL PROTECTED]): > > > I've got a few systems for trapping spam. > > I've been quite happy with spamassassin. Feel free to check out my > writeup: > > http://codesor

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
>>Statements like this lead me to question whether you really know what you're >>talking about. Nah, I never really claimed I knew what I was talking about. ;-) Read back, I actually said that "I might be overstepping my knowledge..." Just asking questions, trying to understand more about it. I

RE: Secure 2.4.x kernel

2001-12-21 Thread Kelly Martin
> Hmmm I don't buy that this *couldn't* be done on the Intel. > I might be overstepping my knowledge, but I'm sure there > *must* be a way. > Going back to my 68k days, it would have been fairly easy > to write this. Hey, I'm not an Intel assembly/opcode expert, > but it seems to me, I think that

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Hmmm I don't buy that this *couldn't* be done on the Intel. I might be overstepping my knowledge, but I'm sure there *must* be a way. Going back to my 68k days, it would have been fairly easy to write this. Hey, I'm not an Intel assembly/opcode expert, but it seems to me, I think that you could si

Re: Secure 2.4.x kernel

2001-12-21 Thread Matthew Sackman
I don't know this for certain, but I've got a feeling that it's this kind of thing that would be very easy to implement in the Hurd - the microkernel would make it very easy to start adding daemons that provide a layer between requests for exec, forks etc and actually granting them. Otoh, the hurd

RE: Secure 2.4.x kernel

2001-12-21 Thread Steven James
Greetings, I have experimented with creating an EXEC capability that is turned on by default (as a quick hack). I didn't consider fork at the time since most breeches involve execing a shell (or some other binary). G'day, sjames Quoting Gary MacDougall <[EMAIL PROTECTED]>: > Interesting. >

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
very interesting. thanks. -Original Message- From: Andres Salomon [mailto:[EMAIL PROTECTED] Sent: Friday, December 21, 2001 1:33 PM To: debian-security@lists.debian.org Subject: Re: Secure 2.4.x kernel Take a look at the St. Jude kernel module/model paper on sourceforge. I haven't gott

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
>>Statements like this lead me to question whether you really know what you're >>talking about. Nah, I never really claimed I knew what I was talking about. ;-) Read back, I actually said that "I might be overstepping my knowledge..." Just asking questions, trying to understand more about it. I

RE: Secure 2.4.x kernel

2001-12-21 Thread Kelly Martin
> Hmmm I don't buy that this *couldn't* be done on the Intel. > I might be overstepping my knowledge, but I'm sure there > *must* be a way. > Going back to my 68k days, it would have been fairly easy > to write this. Hey, I'm not an Intel assembly/opcode expert, > but it seems to me, I think that

Re: Secure 2.4.x kernel

2001-12-21 Thread Andres Salomon
Take a look at the St. Jude kernel module/model paper on sourceforge. I haven't gotten the module to do anything other than hang the box (under 2.4), but the paper itself is interesting, and along the lines of what you want. Essentially, privileged processes have certain syscalls watched (sys_exe

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Hmmm I don't buy that this *couldn't* be done on the Intel. I might be overstepping my knowledge, but I'm sure there *must* be a way. Going back to my 68k days, it would have been fairly easy to write this. Hey, I'm not an Intel assembly/opcode expert, but it seems to me, I think that you could s

Re: Secure 2.4.x kernel

2001-12-21 Thread Robert van der Meulen
Hi, Quoting Alson van der Meulen ([EMAIL PROTECTED]): > http://www.openwall.com/linux/ > The Openwall patches protect against explointing buffer overruns I > think, they're not available for 2.4 yet though. You might seem family, but you should still learn to quote :) (and follow the nettiquette

Re: Party with porn stars

2001-12-21 Thread Peter Hicks
On Friday 21 December 2001 07:15, Justin R. Miller wrote: > Thus spake Karsten M. Self (kmself@ix.netcom.com): > > I've got a few systems for trapping spam. > > I've been quite happy with spamassassin. Feel free to check out my > writeup: > > http://codesorcery.net/docs/spamtricks.html I ju

Re: Secure 2.4.x kernel

2001-12-21 Thread Matthew Sackman
I don't know this for certain, but I've got a feeling that it's this kind of thing that would be very easy to implement in the Hurd - the microkernel would make it very easy to start adding daemons that provide a layer between requests for exec, forks etc and actually granting them. Otoh, the hur

Re: Secure 2.4.x kernel

2001-12-21 Thread Philipp Schulte
Jor-el wrote: > I'm looking to put a 2.4 kernel with (preferably one of the more > recent ones with the new VM subsytem) on a firewall and secure a lab that > I administer. Which kernel version is best suited to this? I set up a Debian based firewall and used kernel 2.4.16. It's running wi

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Interesting. Has someone done some work on this? I'm mean, lets face it, your running a bunch of servers and they have boat loads of daemon's. Why they'll need to fork/exec a shell is really a good question -- in my mind, they don't. I could be wrong. Why not simply build this ability into the

RE: Secure 2.4.x kernel

2001-12-21 Thread Kelly Martin
As far as I know, Linux does not support doing that. So the way you do it is modify your kernel to make fork and exec revokable syscalls, write a syscall allowing a process to request revocation of unneeded syscalls, and add that call to your daemon. Kelly > -Original Message- > From: Ro

RE: Secure 2.4.x kernel

2001-12-21 Thread Robert Clay
And how would one do that? >>> Kelly Martin <[EMAIL PROTECTED]> 12/21/01 12:09PM >>> ...Taking away the fork and exec syscalls from a daemon which does not need to do either would be a good start.

RE: Secure 2.4.x kernel

2001-12-21 Thread Kelly Martin
> Now heres my next questions and its a security one. > Based off what was explained by Noah and Kelly, > it appears to me that Buffer Overruns can be dealt > with at the kernel level and that there is probably > a way in the kernel to stop a root exploit during > a buffer overrun. Why hasn't (or

Re: Secure 2.4.x kernel

2001-12-21 Thread Alson van der Meulen
Gary MacDougall([EMAIL PROTECTED])@2001.12.21 11:59:36 +: > Thanks everyone for the answer. > > I was pretty sure that the kernel would be able > to detect the fault, but I needed to *make* sure > before i asked another question. > > Now heres my next questions and its a security one. > Based

RE: Secure 2.4.x kernel

2001-12-21 Thread Steven James
Greetings, I have experimented with creating an EXEC capability that is turned on by default (as a quick hack). I didn't consider fork at the time since most breeches involve execing a shell (or some other binary). G'day, sjames Quoting Gary MacDougall <[EMAIL PROTECTED]>: > Interesting. >

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
I should also add... I do understand that running processes as "root" is basically the problem... but in theory, the setup of running things under a different user can be a pain -- why not simply allow the kernel to handle it... ... -Original Message- From: Gary MacDougall [mailto:[EMAIL

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Thanks everyone for the answer. I was pretty sure that the kernel would be able to detect the fault, but I needed to *make* sure before i asked another question. Now heres my next questions and its a security one. Based off what was explained by Noah and Kelly, it appears to me that Buffer Overru

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
very interesting. thanks. -Original Message- From: Andres Salomon [mailto:[EMAIL PROTECTED]] Sent: Friday, December 21, 2001 1:33 PM To: [EMAIL PROTECTED] Subject: Re: Secure 2.4.x kernel Take a look at the St. Jude kernel module/model paper on sourceforge. I haven't gotten the module

Re: Secure 2.4.x kernel

2001-12-21 Thread Andres Salomon
Take a look at the St. Jude kernel module/model paper on sourceforge. I haven't gotten the module to do anything other than hang the box (under 2.4), but the paper itself is interesting, and along the lines of what you want. Essentially, privileged processes have certain syscalls watched (sys_ex

Re: Secure 2.4.x kernel

2001-12-21 Thread Robert van der Meulen
Hi, Quoting Alson van der Meulen ([EMAIL PROTECTED]): > http://www.openwall.com/linux/ > The Openwall patches protect against explointing buffer overruns I > think, they're not available for 2.4 yet though. You might seem family, but you should still learn to quote :) (and follow the nettiquette

Re: Party with porn stars

2001-12-21 Thread Peter Hicks
On Friday 21 December 2001 07:15, Justin R. Miller wrote: > Thus spake Karsten M. Self ([EMAIL PROTECTED]): > > I've got a few systems for trapping spam. > > I've been quite happy with spamassassin. Feel free to check out my > writeup: > > http://codesorcery.net/docs/spamtricks.html I just

RE: Secure 2.4.x kernel

2001-12-21 Thread Kelly Martin
> So, in short, seg faults *come*from* the kernel, so of course the kernel > knows when a program segfaults. Actually, segmentation faults come from the processor (more specifically, the memory management unit). The kernel processes the hardware exception and converts it into a signal to be sent

Re: Secure 2.4.x kernel

2001-12-21 Thread Noah L. Meyerhans
On Fri, Dec 21, 2001 at 10:17:35AM -0500, Gary MacDougall wrote: > In the kernel (ok, stand up you kernel guru's!), when a > "segmentation fault" is raised, I don't care where, doesn't the > kernel get some sort of notification event? Of course the kernel knows. The kernel is why seg faults can

Re: Secure 2.4.x kernel

2001-12-21 Thread Philipp Schulte
Jor-el wrote: > I'm looking to put a 2.4 kernel with (preferably one of the more > recent ones with the new VM subsytem) on a firewall and secure a lab that > I administer. Which kernel version is best suited to this? I set up a Debian based firewall and used kernel 2.4.16. It's running w

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Interesting. Has someone done some work on this? I'm mean, lets face it, your running a bunch of servers and they have boat loads of daemon's. Why they'll need to fork/exec a shell is really a good question -- in my mind, they don't. I could be wrong. Why not simply build this ability into the

Re: Party with porn stars

2001-12-21 Thread Justin R. Miller
Thus spake Karsten M. Self (kmself@ix.netcom.com): > I've got a few systems for trapping spam. I've been quite happy with spamassassin. Feel free to check out my writeup: http://codesorcery.net/docs/spamtricks.html -- Justin R. Miller <[EMAIL PROTECTED]> View my website at http://c

RE: Secure 2.4.x kernel

2001-12-21 Thread Kelly Martin
As far as I know, Linux does not support doing that. So the way you do it is modify your kernel to make fork and exec revokable syscalls, write a syscall allowing a process to request revocation of unneeded syscalls, and add that call to your daemon. Kelly > -Original Message- > From: R

RE: Secure 2.4.x kernel

2001-12-21 Thread Robert Clay
And how would one do that? >>> Kelly Martin <[EMAIL PROTECTED]> 12/21/01 12:09PM >>> ...Taking away the fork and exec syscalls from a daemon which does not need to do either would be a good start. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact

Re: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Since we're on the 2.4 kernel, I have a question thats been jawing at me and haven't really had the time to peel through code and look... In the kernel (ok, stand up you kernel guru's!), when a "segmentation fault" is raised, I don't care where, doesn't the kernel get some sort of notification ev

Re: Secure 2.4.x kernel

2001-12-21 Thread J.H.M. Dassen \(Ray\)
On Fri, Dec 21, 2001 at 08:52:56 -0600, Jor-el wrote: > One of the puzzling things mentioned on that site (as well as the Openwall > site that it linked to) was 'trampolines'. Any idea what these are? I guess it's the same trampolines mentioned in gcc's documentation: : GCC implements taking th

RE: Secure 2.4.x kernel

2001-12-21 Thread Kelly Martin
> Now heres my next questions and its a security one. > Based off what was explained by Noah and Kelly, > it appears to me that Buffer Overruns can be dealt > with at the kernel level and that there is probably > a way in the kernel to stop a root exploit during > a buffer overrun. Why hasn't (or

Re: Secure 2.4.x kernel

2001-12-21 Thread Jor-el
On Fri, 21 Dec 2001, marcin wrote: > On Fri, Dec 21, 2001 at 12:14:33AM -0600, Jor-el wrote: > > www.grsecurity.net > > Where is all :> > Marcin, Thanks for the pointer. I will look at those patches. One of the puzzling things mentioned on that site (as well as the Openwall site that i

Re: Secure 2.4.x kernel

2001-12-21 Thread Alson van der Meulen
Gary MacDougall([EMAIL PROTECTED])@2001.12.21 11:59:36 +: > Thanks everyone for the answer. > > I was pretty sure that the kernel would be able > to detect the fault, but I needed to *make* sure > before i asked another question. > > Now heres my next questions and its a security one. > Base

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
I should also add... I do understand that running processes as "root" is basically the problem... but in theory, the setup of running things under a different user can be a pain -- why not simply allow the kernel to handle it... ... -Original Message- From: Gary MacDougall [mailto:[EMAI

RE: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Thanks everyone for the answer. I was pretty sure that the kernel would be able to detect the fault, but I needed to *make* sure before i asked another question. Now heres my next questions and its a security one. Based off what was explained by Noah and Kelly, it appears to me that Buffer Overr

Re: Secure 2.4.x kernel

2001-12-21 Thread Jor-el
On Fri, 21 Dec 2001, Moritz Schulte wrote: > Phillip Hofmeister <[EMAIL PROTECTED]> writes: > > > Unless you like recompiling your kernel 2 or 3 times a month I > > wouldn't look to 2.4 for a FIREWALL kernel yet. If you want the > > neat features of 2.4 I would recomend installing 2.2 on the fir

Who wanted program, which react on syslogd messages in realtime?

2001-12-21 Thread Alex Yemelyanov
Hello, Once upon a time I was necessary to execute some actions in response to one program errors, which wrote their own messages in syslog. I has written simplest script, which read syslogd's reporting from named pipe. However, soon I has wanted to script reacted and on other messages in sy

Re: Secure 2.4.x kernel

2001-12-21 Thread marcin
On Fri, Dec 21, 2001 at 12:14:33AM -0600, Jor-el wrote: > Hi, > > I'm looking to put a 2.4 kernel with (preferably one of the more > recent ones with the new VM subsytem) on a firewall and secure a lab that > I administer. Which kernel version is best suited to this? Or is it the > case that

Re: Secure 2.4.x kernel

2001-12-21 Thread Moritz Schulte
Phillip Hofmeister <[EMAIL PROTECTED]> writes: > Unless you like recompiling your kernel 2 or 3 times a month I > wouldn't look to 2.4 for a FIREWALL kernel yet. If you want the > neat features of 2.4 I would recomend installing 2.2 on the firewall > and another box on the internal network with 2

RE: Secure 2.4.x kernel

2001-12-21 Thread Kelly Martin
> So, in short, seg faults *come*from* the kernel, so of course the kernel > knows when a program segfaults. Actually, segmentation faults come from the processor (more specifically, the memory management unit). The kernel processes the hardware exception and converts it into a signal to be sent

Re: Secure 2.4.x kernel

2001-12-21 Thread Noah L. Meyerhans
On Fri, Dec 21, 2001 at 10:17:35AM -0500, Gary MacDougall wrote: > In the kernel (ok, stand up you kernel guru's!), when a > "segmentation fault" is raised, I don't care where, doesn't the > kernel get some sort of notification event? Of course the kernel knows. The kernel is why seg faults can

Re: Secure 2.4.x kernel

2001-12-21 Thread Phillip Hofmeister
Or is it the > case that such a secure kernel doesnt exist yet in the 2.4 line? Given > Debian's tradition of backporting security fixes, perhaps there is a > Debian-ized 2.4 kernel that would be suited to what I have in mind? I run 2.2.18pre21 on my firewall. It has been known to be stable

Re: Party with porn stars

2001-12-21 Thread Justin R. Miller
Thus spake Karsten M. Self ([EMAIL PROTECTED]): > I've got a few systems for trapping spam. I've been quite happy with spamassassin. Feel free to check out my writeup: http://codesorcery.net/docs/spamtricks.html -- Justin R. Miller <[EMAIL PROTECTED]> View my website at http://cod

Re: Secure 2.4.x kernel

2001-12-21 Thread Gary MacDougall
Since we're on the 2.4 kernel, I have a question thats been jawing at me and haven't really had the time to peel through code and look... In the kernel (ok, stand up you kernel guru's!), when a "segmentation fault" is raised, I don't care where, doesn't the kernel get some sort of notification e

Re: Secure 2.4.x kernel

2001-12-21 Thread J.H.M. Dassen (Ray)
On Fri, Dec 21, 2001 at 08:52:56 -0600, Jor-el wrote: > One of the puzzling things mentioned on that site (as well as the Openwall > site that it linked to) was 'trampolines'. Any idea what these are? I guess it's the same trampolines mentioned in gcc's documentation: : GCC implements taking t

Re: Secure 2.4.x kernel

2001-12-21 Thread Jor-el
On Fri, 21 Dec 2001, marcin wrote: > On Fri, Dec 21, 2001 at 12:14:33AM -0600, Jor-el wrote: > > www.grsecurity.net > > Where is all :> > Marcin, Thanks for the pointer. I will look at those patches. One of the puzzling things mentioned on that site (as well as the Openwall site that

Re: Secure 2.4.x kernel

2001-12-21 Thread Jor-el
On Fri, 21 Dec 2001, Moritz Schulte wrote: > Phillip Hofmeister <[EMAIL PROTECTED]> writes: > > > Unless you like recompiling your kernel 2 or 3 times a month I > > wouldn't look to 2.4 for a FIREWALL kernel yet. If you want the > > neat features of 2.4 I would recomend installing 2.2 on the fi

Who wanted program, which react on syslogd messages in realtime?

2001-12-21 Thread Alex Yemelyanov
Hello, Once upon a time I was necessary to execute some actions in response to one program errors, which wrote their own messages in syslog. I has written simplest script, which read syslogd's reporting from named pipe. However, soon I has wanted to script reacted and on other messages in sys

Re: Secure 2.4.x kernel

2001-12-21 Thread marcin
On Fri, Dec 21, 2001 at 12:14:33AM -0600, Jor-el wrote: > Hi, > > I'm looking to put a 2.4 kernel with (preferably one of the more > recent ones with the new VM subsytem) on a firewall and secure a lab that > I administer. Which kernel version is best suited to this? Or is it the > case tha

Re: Secure 2.4.x kernel

2001-12-21 Thread Moritz Schulte
Phillip Hofmeister <[EMAIL PROTECTED]> writes: > Unless you like recompiling your kernel 2 or 3 times a month I > wouldn't look to 2.4 for a FIREWALL kernel yet. If you want the > neat features of 2.4 I would recomend installing 2.2 on the firewall > and another box on the internal network with

Re: Secure 2.4.x kernel

2001-12-21 Thread Phillip Hofmeister
Or is it the > case that such a secure kernel doesnt exist yet in the 2.4 line? Given > Debian's tradition of backporting security fixes, perhaps there is a > Debian-ized 2.4 kernel that would be suited to what I have in mind? I run 2.2.18pre21 on my firewall. It has been known to be stabl

Re: Party with porn stars

2001-12-21 Thread Karsten M. Self
on Fri, Dec 21, 2001 at 03:39:48AM -0500, k l u r t ([EMAIL PROTECTED]) wrote: > On Friday 21 December 2001 02:16 am, [EMAIL PROTECTED] wrote: > > Hey everyone, > > > > Ever wanted to party with your favorite porn stars?? > > relay for spam > geez.. what a waste of a good FreeBSD box.. I've

Re: Party with porn stars

2001-12-21 Thread k l u r t
On Friday 21 December 2001 02:16 am, [EMAIL PROTECTED] wrote: > Hey everyone, > > Ever wanted to party with your favorite porn stars?? relay for spam geez.. what a waste of a good FreeBSD box.. @debian:~$ whois 64.38.226.213 CWIE LLC (NETBLK-CWIE-BLK-1) 1125 E Glendale AVE Phoenix, A

Re: Party with porn stars

2001-12-21 Thread Karsten M. Self
on Fri, Dec 21, 2001 at 03:39:48AM -0500, k l u r t ([EMAIL PROTECTED]) wrote: > On Friday 21 December 2001 02:16 am, [EMAIL PROTECTED] wrote: > > Hey everyone, > > > > Ever wanted to party with your favorite porn stars?? > > relay for spam > geez.. what a waste of a good FreeBSD box.. I'v

Party with porn stars

2001-12-21 Thread onazeepictures
Hey everyone, Ever wanted to party with your favorite porn stars?? Well, now you can!! That's right. We at Ona zee pictures are constantly getting hundreds if not thousands of emails and phone calls from people asking how they can meet there favorite porn stars, so this is what we've decided to

Secure 2.4.x kernel

2001-12-21 Thread Jor-el
Hi, I'm looking to put a 2.4 kernel with (preferably one of the more recent ones with the new VM subsytem) on a firewall and secure a lab that I administer. Which kernel version is best suited to this? Or is it the case that such a secure kernel doesnt exist yet in the 2.4 line? Given Debi

Re: Party with porn stars

2001-12-21 Thread k l u r t
On Friday 21 December 2001 02:16 am, [EMAIL PROTECTED] wrote: > Hey everyone, > > Ever wanted to party with your favorite porn stars?? relay for spam geez.. what a waste of a good FreeBSD box.. @debian:~$ whois 64.38.226.213 CWIE LLC (NETBLK-CWIE-BLK-1) 1125 E Glendale AVE Phoenix,