Re: Permissions Required On hosts.allow ?

2002-08-28 Thread Jamie Heilman
> So I've opened perms up to 644 again, but this seems the wrong thing > to do. I realise I was only gaining a minor layer of > security-thru-obscurity, but every little helps - surely we don't > want this file to be world-readable ? > > I note from inetd.conf that in.telnetd runs as uid.gid > te

Re: Permissions Required On hosts.allow ?

2002-08-28 Thread Indra Kusuma
On Thu, 29 Aug 2002, Jason Clarke wrote: # Found the problem to be that SSH was doing DNS lookups on IP's. # # So I setup an internal reverse DNS for my local lan, and shebang, it's # almost instant now. use -u0 on the sshd option Cheers, Indra Kusuma -- ,''`. Indra{@,.}Kusuma.OR.ID -> [person

Re: Permissions Required On hosts.allow ?

2002-08-28 Thread Jason Clarke
Nick, I found that SSHd was being unreasonably slow in authorising logins.. Found the problem to be that SSH was doing DNS lookups on IP's. So I setup an internal reverse DNS for my local lan, and shebang, it's almost instant now. Jason - Original Message - From: "Nick Boyce" <> To: S

Permissions Required On hosts.allow ?

2002-08-28 Thread Nick Boyce
[hope this isn't too lame a question for this list] I decided to start locking down permissions on "sensitive" files on a recently installed Woody box, and discovered that when I changed the permissions on "hosts.allow" (and "hosts.deny") to 640 then I could no longer Telnet into the box from the

Re: Mail relay attempts

2002-08-28 Thread Peter Cordes
On Wed, Aug 28, 2002 at 11:56:24AM +0200, Michael Renzmann wrote: > Hi. > > Jones, Steven wrote: > >Ive found port sentry really good for detecting port scans and then > >routeing > >the return packets to no where. > > As an addition to that idea: would it be possible to cause similar > effects

unsubscribe

2002-08-28 Thread Oliver Drechsler
thx

Re: [SECURITY] [DSA 159-1] New Python packages fix insecure temporary file use

2002-08-28 Thread Siegbert Baude
Hi Matt, > Ah, I missed the part where you said this was a potato system. It looks > like you are installing woody security updates on a potato system. You > probably have a line like this: > > deb http://security.debian.org/ stable/updates main > > in /etc/apt/sources.list. Since Debian 3.0 (wo

Re: [SECURITY] [DSA 159-1] New Python packages fix insecure temporary file use

2002-08-28 Thread Siegbert Baude
Hi, after an "apt-get update" on my potato box, the following happens: wurm:~# apt-get upgrade Reading Package Lists... Done Building Dependency Tree... Done The following packages have been kept back python-base python-tk 0 packages upgraded, 0 newly installed, 0 to remove and 2 not upgraded.

Re: debian-security-announce-$lang@lists?

2002-08-28 Thread vdongen
> I think as a German I'm allowed to say this: > > No English, no security. There will always be bits and pieces > available > in English only. Making DSAs available in foreign languages will help > amateurs without sufficient English skills to keep their systems up > to date. It might even help p

Re: Mail relay attempts

2002-08-28 Thread Michael Renzmann
Hi. Jones, Steven wrote: Ive found port sentry really good for detecting port scans and then routeing the return packets to no where. As an addition to that idea: would it be possible to cause similar effects to HTTP-server worms with a modified tarpit? Maybe a modified version of the kernel

Re: Mail relay attempts

2002-08-28 Thread Michael Renzmann
Hi Dale. Dale Amon wrote: The only thing you can do is to make damn certain your box does not become part of the problem. I'll add to that: make sure you actually check your logs. I use syslog-ng to bring all essential realtime logging to a hardened server; I'll add another one to that: I st

RE: cryptoloop confusion

2002-08-28 Thread DEFFONTAINES Vincent
It seems to me, you need not only the patch-int , but also the loop patch, which can be found at ftp://ftp.kernel.org/pub/linux/crypto/v2.4/testing/loop-hvr-2.4.18.0.patch You have to use it else the cryptoloop compile part fails. Why the loop patch is not included in the patch-int patch, I do not

Re: cryptoloop confusion

2002-08-28 Thread Ivo Timmermans
Jeff wrote: > I've decided to learn how to setup an encrypted filesystem using the > cryptoloop method and I'm having troubles getting my kernal source > patched correctly. I've read the "Loopback Encrypted Filesystem > HOWTO", but it's outdated. Here are a number of patches for kernel > 2.4.18 a