Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Monday, December 24, 2001, at 10:52 , Gary MacDougall wrote: Someone said that St. Jude was what I was looking for, and I think its pretty much *exactly* what I was pointing out. Can't, in general, stop an attack. All the attacker has to do is not do unusual calls which jude monitors, whi

Re: iptables missing library (FIXED)

2001-12-24 Thread Jeff
Howland, Curtis, 2001-Dec-25 13:08 +0900: > This may seem an obvious question, but have you coordinated that "ipchains" > works with the 2.2.x kernels, and "iptables" with the 2.4.x kernels? > > Woody standard kernel is still 2.2.x. > > Curt Thanks for the suggestion. I am running woody with a

RE: iptables missing library

2001-12-24 Thread Howland, Curtis
This may seem an obvious question, but have you coordinated that "ipchains" works with the 2.2.x kernels, and "iptables" with the 2.4.x kernels? Woody standard kernel is still 2.2.x. Curt- > -Original Message- > From: Jeff [mailto:[EMAIL PROTECTED] > Sent: Tuesday, December 25, 2001 12:

iptables missing library

2001-12-24 Thread Jeff
I've recently discovered the "badflags" capabilities in iptables and I'm playing with some rules. However, when I load the rules, I get the following error message: Try `iptables -h' or 'iptables --help' for more information. iptables v1.2.3: Couldn't load target `badflags':/lib/iptables/libipt_b

Re: Secure 2.4.x kernel

2001-12-24 Thread Gary MacDougall
> On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: > > > Wouldn't it be nice to be able to run the kernel in "secure mode"? > > I'm curious to know if we could limit the amount of "root exploits" > > by this method, it would REALLY harden up security on a > > Linux box... anyone hav

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
making the disks readonly is not trivial ... lots of work to make it readonly.. a fun project ... Not really. Nothing should write anywhere except /var and /tmp (did I miss any). Also, if you have users, then /home. In particular, if it is in $PATH, make it read-only. Many root kits trojan

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Monday, December 24, 2001, at 10:52 , Gary MacDougall wrote: > Someone said that St. Jude was what I was looking for, and I think > its pretty much *exactly* what I was pointing out. Can't, in general, stop an attack. All the attacker has to do is not do unusual calls which jude monitors, w

Re: iptables missing library (FIXED)

2001-12-24 Thread Jeff
Howland, Curtis, 2001-Dec-25 13:08 +0900: > This may seem an obvious question, but have you coordinated that "ipchains" works >with the 2.2.x kernels, and "iptables" with the 2.4.x kernels? > > Woody standard kernel is still 2.2.x. > > Curt Thanks for the suggestion. I am running woody with a

RE: iptables missing library

2001-12-24 Thread Howland, Curtis
This may seem an obvious question, but have you coordinated that "ipchains" works with the 2.2.x kernels, and "iptables" with the 2.4.x kernels? Woody standard kernel is still 2.2.x. Curt- > -Original Message- > From: Jeff [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, December 25, 2001 12

iptables missing library

2001-12-24 Thread Jeff
I've recently discovered the "badflags" capabilities in iptables and I'm playing with some rules. However, when I load the rules, I get the following error message: Try `iptables -h' or 'iptables --help' for more information. iptables v1.2.3: Couldn't load target `badflags':/lib/iptables/libipt_

Re: Secure 2.4.x kernel

2001-12-24 Thread Gary MacDougall
> On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: > > > Wouldn't it be nice to be able to run the kernel in "secure mode"? > > I'm curious to know if we could limit the amount of "root exploits" > > by this method, it would REALLY harden up security on a > > Linux box... anyone ha

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
> making the disks readonly is not trivial ... > lots of work to make it readonly.. a fun project ... Not really. Nothing should write anywhere except /var and /tmp (did I miss any). Also, if you have users, then /home. In particular, if it is in $PATH, make it read-only. Many root kits troja

Re: Secure 2.4.x kernel - stack

2001-12-24 Thread Alvin Oga
hi ya > Also, when you look at how memory is laid out, having two stacks > is problematic. Under linux, it looks like this: > > --- >| KERNEL | | stack | < grows downward >||--- >|| >| user | > --- >|

Re: Secure 2.4.x kernel

2001-12-24 Thread Alvin Oga
hi ya On Mon, 24 Dec 2001, Anthony DeRobertis wrote: > > On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: > > > Wouldn't it be nice to be able to run the kernel in "secure mode"? > > I'm curious to know if we could limit the amount of "root exploits" > > by this method, it wou

selam 2

2001-12-24 Thread ARZU COLAK
Selam sana bir site oneriyorum kesin bak! , OYUNLAR SADECE 2.750.000 TL! http://www.alisveris.sehri.com http://www.alisveris.sehri.com iyi gunler, Bu mesaj htp://www.aslan.mekani.com üzerinden yollanmistir! Uye olmak icin ; http://astavilla.kolayweb.com/haber.htm

Re: Secure 2.4.x kernel - stack

2001-12-24 Thread Alvin Oga
hi ya > Also, when you look at how memory is laid out, having two stacks > is problematic. Under linux, it looks like this: > > --- >| KERNEL | | stack | < grows downward >||--- >|| >| user | > --- >

Re: Secure 2.4.x kernel

2001-12-24 Thread Alvin Oga
hi ya On Mon, 24 Dec 2001, Anthony DeRobertis wrote: > > On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: > > > Wouldn't it be nice to be able to run the kernel in "secure mode"? > > I'm curious to know if we could limit the amount of "root exploits" > > by this method, it wo

selam 2

2001-12-24 Thread ARZU COLAK
Selam sana bir site oneriyorum kesin bak! , OYUNLAR SADECE 2.750.000 TL! http://www.alisveris.sehri.com http://www.alisveris.sehri.com iyi gunler, Bu mesaj htp://www.aslan.mekani.com üzerinden yollanmistir! Uye olmak icin ; http://astavilla.kolayweb.com/haber.htm

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Saturday, December 22, 2001, at 07:22 , System Administrator wrote: The assembly statement "jsr" (jump to subroutine) puts the return address on the same stack, where space for local variables is reserved. Local variables, parameters, temporaries, etc. Yes, it's all the same stack on ev

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: Wouldn't it be nice to be able to run the kernel in "secure mode"? I'm curious to know if we could limit the amount of "root exploits" by this method, it would REALLY harden up security on a Linux box... anyone have any opinions on

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Saturday, December 22, 2001, at 07:22 , System Administrator wrote: > The assembly statement "jsr" (jump to subroutine) puts the > return address > on the same stack, where space for local variables is reserved. > Local variables, parameters, temporaries, etc. Yes, it's all the same stack

Re: Secure 2.4.x kernel

2001-12-24 Thread Anthony DeRobertis
On Friday, December 21, 2001, at 03:25 , Gary MacDougall wrote: > Wouldn't it be nice to be able to run the kernel in "secure mode"? > I'm curious to know if we could limit the amount of "root exploits" > by this method, it would REALLY harden up security on a > Linux box... anyone have any opin