hi ya john
On Wed, 26 Jun 2002, John Galt wrote:
> On Wed, 26 Jun 2002, Alvin Oga wrote:
> >
> >if an attacker got in ... as a user game over... they got in ???
> > - question is what damage can they do as "user" ...
>
> that's what happened--the EPIC hole gave user. monkey.org (Dug So
El mar, 25-06-2002 a las 12:40, Robert van der Meulen escribió:
> and disclosure is only done when it doesn't affect
> openbsd (or the '5 years without..' line on openbsd.org).
You'll love this one:
"One remote hole in the default install, in nearly 6 years!"
Great X'DD
Depending on the language
Travis Cole <[EMAIL PROTECTED]> writes:
> On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote:
> > Hi all
> >
> > Messing up with sshd_config for all the privsep stuff, I've
> > noticed that PermitRootLogin was set to yes in my three woody
> > boxes. I usually consider t
On Wed, 26 Jun 2002, Alvin Oga wrote:
>
>hi all
>
>if an attacker got in ... as a user game over... they got in ???
> - question is what damage can they do as "user" ...
that's what happened--the EPIC hole gave user. monkey.org (Dug Song) was
using standard security practice at that
Alvin,
If the cracker can get in as a user, it's merely a matter of time before they
can worm their way into becoming root. Defenses against this are difficult, the
NSA version "SELinux" deliberately places great restrictions on user abilities
to try to prevent just such things. But I don't thi
hi ya
in order to update 10, 100 boxes ... with new setof changes..
you do NOT need to login into any of um ... many different ways to update
each target box based on some "master distribution server"
-- you do want to test the updates in a test farm before it goes out to
production and prot
-Original Message-
From: X-Force [mailto:[EMAIL PROTECTED]
Sent: Wednesday, June 26, 2002 9:56 PM
To: bugtraq@securityfocus.com
Subject: ISS Advisory: OpenSSH Remote Challenge Vulnerability
-BEGIN PGP SIGNED MESSAGE-
Internet Security Systems Security Advisory
June 26, 2002
Op
hi all
if an attacker got in ... as a user game over... they got in ???
- question is what damage can they do as "user" ...
if an attacker get in the same way as root... game is really over...
as they now have complete control of yoru machine..
- i prefer to disallow root l
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote:
> Hi all
>
> Messing up with sshd_config for all the privsep stuff, I've noticed that
> PermitRootLogin was set to yes in my three woody boxes. I usually
> consider this a problem (although it has been my fault - i shoul
That's how monkey.org got taken over--they SCREENed a su, and the attacker
reattached it after getting as user via EPIC...
On 26 Jun 2002, Christian Egli wrote:
>
>Simon Kirby <[EMAIL PROTECTED]> writes:
>
>> Using "su root" later is worse than just logging in as root with a key.
>
>I cannot un
On Wednesday, June 26, 2002, at 03:50 PM, Richard wrote:
Even worse, on 2.0.x kernels "PrivilegeSeparation" doesn't work,
rendinging sshd useless for interactive sessions or make it vurneble is
you disable it.
All debian versions of ssh packages are not vulnerable, AFAIK. I'm
hoping the secu
On Wed, 26 Jun 2002, Paul Baker wrote:
> I'm curious what recourse Debian is planning to take now? Perhaps
> removing the buggy OpenSSH 3.3 packages off of security.debian.org so
> people don't upgrade to it since it's not at all necessary and it will
> only cause problems like screwing up com
This won't work. Have you noticed how EVERY MESSAGE says exactly how to do
it, and how you didn't do that?
You need to sent the message to [EMAIL PROTECTED]
On Wed, Jun 26, 2002 at 09:34:09PM +0200, [EMAIL PROTECTED] wrote:
>
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a su
On Wed, Jun 26, 2002 at 02:35:21PM -0500, Paul Baker wrote:
>
> I'm curious what recourse Debian is planning to take now? Perhaps
> removing the buggy OpenSSH 3.3 packages off of security.debian.org so
> people don't upgrade to it since it's not at all necessary and it will
> only cause problem
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
So as it turns out, AFAIK, none of the versions of OpenSSH in Debian
were actually vulnerable to the exploit found by ISS and reported in
DSA-134
Potato wasn't vulnerable because it is SSH1 only, and the problem lies
in the ChallengeResponseAuthe
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote:
> Hi all
>
> Messing up with sshd_config for all the privsep stuff, I've noticed that
> PermitRootLogin was set to yes in my three woody boxes. I usually
> consider this a problem (although it has been my fault - i shoul
On Wednesday, 2002-06-26 at 18:14:35 +0200, Mark Janssen wrote:
> >From what I understand, the advisory below is for the security issue
> we've been buggering over for the last 2-3 days.
> As I understand it, there is no need to upgrade to openssh 3.3 and use
> priv-sep code, when we turn of the v
On Wed, Jun 26, 2002 at 07:23:49PM +0200, Florian Weimer wrote:
> Well, it appears if OpenSSH 1.2.3 was *not* vulnerable, so the whole
> exercise was rather pointless.
But drill inspector Theo ("update and don't ask questions, soldier!"), showed
at least how good our new security upload architectu
On Wed, 2002-06-26 at 13:23, Florian Weimer wrote:
> Well, it appears if OpenSSH 1.2.3 was *not* vulnerable, so the whole
> exercise was rather pointless.
>
> Thanks, Theo.
"Worst advisory ever."
-m
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contac
I don't see a better way of handling the OpenSSH announcement. More details or
a patch would have allowed people to start writing exploits, at least they
warned users of an upcoming bug and provided a work around. The OpenSSH team
had to communicate with many vendors and eventually the details w
I think there may be a compromise solution here...
In short: it is good to make people log in as a normal user before trying
to log in as root, because that way an attacker needs to compromise a
normal user before starting on root. The standard way of doing this is
to use "su", but that only acce
Florian Weimer <[EMAIL PROTECTED]> writes:
> Wichert Akkerman <[EMAIL PROTECTED]> writes:
>
>> Definitely. I really wish we could do more but the complete lack
>> of more information we have make things difficult. Backporting
>> OpenSSH 3.3p1 to to potato is also slightly complicated by missing
>>
Head over to OpenSSH.com
They have just released version 3.4, which should fix some overflow
problems and adds lot's of new checks against dubious input.
Advisories and updates on the various pages there.
Mark Janssen
Syconos IT Consultancy
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with
Hi Simon,
This one time, [EMAIL PROTECTED] wrote:
> I am a bit worried about the ssh advisories, not the actual package
> itself (well, that too) but the way it was handled -- the openssh team
> issued new versions of a package and a security advisory asking
> everyone to update to the new package
I am a bit worried about the ssh advisories, not the actual package
itself (well, that too) but the way it was handled -- the openssh team
issued new versions of a package and a security advisory asking
everyone to update to the new package, Debian and others jumped on it
and sent the new version o
Sebastian Rittau <[EMAIL PROTECTED]> writes:
> On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote:
>
> > IMHO, we'd better set it to no. I always thought it was much better. Is
> > there any landscape in which you may want to allow direct root login to
> > your host?
>
El mié, 26-06-2002 a las 16:39, Sebastian Rittau escribió:
> Yes, there is. For example I have some servers that retrieve their user
> information from a database. If the database is not reachable, an
> ordinary user can't login, but root can, since it's the only local
> account with login privileg
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis Gómez wrote:
> IMHO, we'd better set it to no. I always thought it was much better. Is
> there any landscape in which you may want to allow direct root login to
> your host?
Yes, there is. For example I have some servers that retrie
On Wed, Jun 26, 2002 at 05:08:32PM +0200, Christian Egli wrote:
> Simon Kirby <[EMAIL PROTECTED]> writes:
>
> > Using "su root" later is worse than just logging in as root with a key.
>
> I cannot understand why using "su root" later would be worse. Can you
> enlighten me?
Sure.
In all cases,
On Wed, Jun 26, 2002 at 04:05:58PM +0200, Christoph Ulrich Scholler wrote:
On Wed, Jun 26, 2002 at 02:11:00PM +0200 or thereabouts,
InfoEmergencias - Luis Gómez wrote:
> Messing up with sshd_config for all the privsep stuff, I've noticed that
> PermitRootLogin was set to yes in my three woody
Hi Mark,
From the OpenSSH web page:
"At least one major security vulnerability exists in many deployed
OpenSSH versions (2.9.9 to 3.3). Please see the ISS advisory, or our own
OpenSSH advisory on this topic where simple patches are provided for the
pre-authentication problem. Systems running with
>From what I understand, the advisory below is for the security issue
we've been buggering over for the last 2-3 days.
As I understand it, there is no need to upgrade to openssh 3.3 and use
priv-sep code, when we turn of the various challenge-response systems
discussed below (BSD-AUTH and SKEY).
Simon Kirby <[EMAIL PROTECTED]> writes:
> Using "su root" later is worse than just logging in as root with a key.
I cannot understand why using "su root" later would be worse. Can you
enlighten me?
--
Christian Egli
wyona: research & development
http://www.wyona.com
--
To UNSUBSCRIBE, email
On Wed, Jun 26, 2002 at 04:05:58PM +0200, Christoph Ulrich Scholler wrote:
> On Wed, Jun 26, 2002 at 02:11:00PM +0200 or thereabouts, InfoEmergencias -
> Luis Gómez wrote:
> > Messing up with sshd_config for all the privsep stuff, I've noticed that
> > PermitRootLogin was set to yes in my three w
On Wed, Jun 26, 2002 at 02:11:00PM +0200 or thereabouts, InfoEmergencias - Luis
Gómez wrote:
> Messing up with sshd_config for all the privsep stuff, I've noticed that
> PermitRootLogin was set to yes in my three woody boxes. I usually
> consider this a problem (although it has been my fault - i s
I tend to set it to "without-password" to allow a remote root entry only
via RSA/DSA keys, also making sure to restrict it further with as many
applicable options for "AuthorizedKeysFile" ( man sshd )
This is done as a restricated remote root backdoor as well as automated
network backups via dump
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis G?mez wrote:
> IMHO, we'd better set it to no. I always thought it was much better. Is
> there any landscape in which you may want to allow direct root login to
> your host?
rsync where you want to keep userid/groupid info.
--
GOVE
>Is
> there any landscape in which you may want to allow direct
> root login to
> your host?
I allow it to my firewall, since there isnt any other account on there. but
then again, that system only listens to my internal interfaces.. So, not
typical maybe?
--
To UNSUBSCRIBE, email to [EMAIL P
Hi all
Messing up with sshd_config for all the privsep stuff, I've noticed that
PermitRootLogin was set to yes in my three woody boxes. I usually
consider this a problem (although it has been my fault - i should have
checked and noticed this much time ago). What do you think of this?
IMHO, we'd b
Title: Re: Problems with SSH Upgrade
Hi,
> Disabling protocol version 2. Could not load host key
> Restarting OpenBSD Secure Shell server: sshd
> Disabling protocol version 2. Could not load host key
>
[SNIP]
>
* [Moritz Schulte]
> As a side note: many network daemons could make use of this special
> feature to be more secure.
Off the top of my head, I can think of telnetd, popd and imapd.
For ssh, you would need to support public key authentication in the
passwd server, and ftp will have to deal with
Content-type:text/html
http://www.lojadotelemovel.com/images/riscado_cinza.gif";>
http://www.lojadotelemovel.com/mailing/images/logo.gif";
width="580" height="49">
http://www.lojadotelemovel.com/mailing/images/topo.jpg"; width="580"
heigh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi
Firts: the potato upgrade works perfectly for me.
But I upgraded a woodybox (kernel 2.4.18-686) to
ssh_1%3a3.3p1-0.0woody4_i386.deb .
When restarting sshd by the init script the following error message
is droped
Disabling protocol version 2. Co
Phillip Hofmeister <[EMAIL PROTECTED]> writes:
[Not directly in reference to this problem, just some more
information.]
> *TECHNICALLY* every login is root.
Yes, that is how it works in Unix. People could say that this concept
is not perfect. Since Debian is not only a GNU/Linux distribution
a
On 26 Jun 2002, David Bell wrote:
> It seems to be down again... I'm getting connection timed out messages,
> though, I was able to connect a half hour ago.
SurfNet (where s.d.o is hosted) is having some router gone wild. It tends
to be down one minute and up a few later. They're working on th
It seems to be down again... I'm getting connection timed out messages,
though, I was able to connect a half hour ago.
On Tue, 2002-06-25 at 23:02, Jonas Weismüller wrote:
>
> Yes, it came back! Everything fine now ! ;-)
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubsc
On Wed, Jun 26, 2002 at 02:35:09PM +0900, Curt Howland wrote:
> Ok, it's resolved.
>
> I have never generated keys for ssh2 so, rather than fall back to ssh1,
> it just fails.
>
> If I tell the client to force ssh1 "ssh -1", it works with the ssh1 RSA
> keys just fine.
>
> If I turn on password
Back it out...
If you read the release notes you would have seen that the ssh
upgrade has problems with PAM. Use something like IPCHAINS or
IPTABLES to restrict which IP addresses are allowed to access
your box via SSH until such time that SSH using privilege
separation handles PAM properly.
Both are on SurfNet in The netherlands, I suppose they went down for a
short while or the connection between your ISP and Surf went down.
Greetings,
Ivo van Dongen
-Original Message-
From: "Ng Fong Chu" <[EMAIL PROTECTED]>
Date: Wed, 26 Jun 2002 13:51:06 +0800
Subject: non-us.debian.org
Ng Fong Chu wrote:
>
> I am installing Debian but having problem to connect to non-us.debian.org,
> Pls help. Thanks.
>
> Fong Chu
Have you tried the mirrors?
deb http://ftp.jp.debian.org/debian-non-US testing/non-US main contrib
non-free
--
September 11th, 2001
The proudest day for gun cont
I am installing Debian but having problem to connect to non-us.debian.org,
Pls help. Thanks.
Fong Chu
- Original Message -
From: "Jonas Weismüller" <[EMAIL PROTECTED]>
To:
Sent: Wednesday, June 26, 2002 12:02 PM
Subject: Re: security.debian.org is down
> > I can ping it, and I just di
Ok, it's resolved.
I have never generated keys for ssh2 so, rather than fall back to ssh1,
it just fails.
If I tell the client to force ssh1 "ssh -1", it works with the ssh1 RSA
keys just fine.
If I turn on password authentication, it "fails back" to that just fine.
I guess if the server and cli
53 matches
Mail list logo