Hello Martynas,
Monday, March 3, 2003, 7:21:32 PM, you wrote:
MD> Try this: http://www.htthost.com/ , but use it on your own risk. It is a
Thanks, this could help me.
MD> real security hole. Better is to ask system administrator open some
I am a system administrator, and my users want to work wi
apt-get update/upgrade is good enough for me as a way to keep up with
security updates at the binary level, but what's the best way to keep
up with source-level security updates (e.g. patches to the kernel or
to compiled-in modules)?
[Since applying these patches can be very inconvenient, it
apt-get update/upgrade is good enough for me as a way to keep up with
security updates at the binary level, but what's the best way to keep
up with source-level security updates (e.g. patches to the kernel or
to compiled-in modules)?
[Since applying these patches can be very inconvenient, it
Vassilii Khachaturov wrote:
(See also the bugs from the CC).
I believe that Debian should be somehow put on the CERT vendor list:
they give the vendors more advance warning on the security issues before
they issue an advisory, allowing to issue an emergency patch.
Does anybody on this list (debi
apt-get update/upgrade is good enough for me as a way to keep up with
security updates at the binary level, but what's the best way to keep
up with source-level security updates (e.g. patches to the kernel or
to compiled-in modules)?
[Since applying these patches can be very inconvenient, it
Jeremy T. Bouse wrote:
It's been discussed plenty on the Debian mailing lists as well
as having the package maintainer give an update on the status of the
packages that are being prepared/ready at this time... Might suggest
checking a bit further before making such a rash judgement on i
apt-get update/upgrade is good enough for me as a way to keep up with
security updates at the binary level, but what's the best way to keep
up with source-level security updates (e.g. patches to the kernel or
to compiled-in modules)?
[Since applying these patches can be very inconvenient, it
Debian co-ordinates between quite a few hardware types, that takes time. If
at the end of the day you believe Mandrake is better go install Mandrake.
Before you do take a look at how many bugs/patches Mandrake has announced v
Debian over say the last year. I wouldnt be surprised if 1) Debian is on
Quoting Bernard Lheureux <[EMAIL PROTECTED]>:
> On Monday 03 March 2003 23:06, Jeremy T. Bouse wrote:
> > > In case noone noticed, news of a Sendmail vulnerability appeared
> > > on Slashdot. The really interesting piece of the story for me was the
> > > portion of the blurb with said "...RedHat
On Monday 03 March 2003 23:06, Jeremy T. Bouse wrote:
> > In case noone noticed, news of a Sendmail vulnerability appeared
> > on Slashdot. The really interesting piece of the story for me was the
> > portion of the blurb with said "...RedHat and OpenBSD have already issued
> > patches.link
Vassilii Khachaturov wrote:
(See also the bugs from the CC).
I believe that Debian should be somehow put on the CERT vendor list:
they give the vendors more advance warning on the security issues before
they issue an advisory, allowing to issue an emergency patch.
Does anybody on this list (debian-
Jeremy T. Bouse wrote:
It's been discussed plenty on the Debian mailing lists as well
as having the package maintainer give an update on the status of the
packages that are being prepared/ready at this time... Might suggest
checking a bit further before making such a rash judgement on iss
Debian co-ordinates between quite a few hardware types, that takes time. If
at the end of the day you believe Mandrake is better go install Mandrake.
Before you do take a look at how many bugs/patches Mandrake has announced v
Debian over say the last year. I wouldnt be surprised if 1) Debian is on
It's been discussed plenty on the Debian mailing lists as well
as having the package maintainer give an update on the status of the
packages that are being prepared/ready at this time... Might suggest
checking a bit further before making such a rash judgement on issues
arelady being dealt w
Quoting Bernard Lheureux <[EMAIL PROTECTED]>:
> On Monday 03 March 2003 23:06, Jeremy T. Bouse wrote:
> > > In case noone noticed, news of a Sendmail vulnerability appeared
> > > on Slashdot. The really interesting piece of the story for me was the
> > > portion of the blurb with said "...RedHat
Debian systems tend to use Exim by default? my installs certainly do. Mind
you I remove it and install Sendmail usually as its our "standard". So Im a
we bit concerned. No updates from security.debian as of 2:00AM NZT. Im not
blaming Debian ppl here of being slow or anything, they do a fine job of
(See also the bugs from the CC).
I believe that Debian should be somehow put on the CERT vendor list:
they give the vendors more advance warning on the security issues before
they issue an advisory, allowing to issue an emergency patch.
Does anybody on this list (debian-security) have any ties wit
Hi,
In case noone noticed, news of a Sendmail vulnerability appeared
on Slashdot. The really interesting piece of the story for me was the
portion of the blurb with said "...RedHat and OpenBSD have already issued
patches.links to an update from SuSE, too".
What about Debian?
On Monday 03 March 2003 23:06, Jeremy T. Bouse wrote:
> > In case noone noticed, news of a Sendmail vulnerability appeared
> > on Slashdot. The really interesting piece of the story for me was the
> > portion of the blurb with said "...RedHat and OpenBSD have already issued
> > patches.link
HI,
I don't see Debian listed in the notification list at the bottom of the
CERT Advisory. Is there any estimate on the release of patched sendmail
packages?
Ramon Kagan
York University, Computing and Network Services
Unix Team - Intermediate System Administrator
(416)736-2100 #20263
[EMAIL PRO
It's been discussed plenty on the Debian mailing lists as well
as having the package maintainer give an update on the status of the
packages that are being prepared/ready at this time... Might suggest
checking a bit further before making such a rash judgement on issues
arelady being dealt w
Debian systems tend to use Exim by default? my installs certainly do. Mind
you I remove it and install Sendmail usually as its our "standard". So Im a
we bit concerned. No updates from security.debian as of 2:00AM NZT. Im not
blaming Debian ppl here of being slow or anything, they do a fine job of
(See also the bugs from the CC).
I believe that Debian should be somehow put on the CERT vendor list:
they give the vendors more advance warning on the security issues before
they issue an advisory, allowing to issue an emergency patch.
Does anybody on this list (debian-security) have any ties wit
Hi,
In case noone noticed, news of a Sendmail vulnerability appeared
on Slashdot. The really interesting piece of the story for me was the
portion of the blurb with said "...RedHat and OpenBSD have already issued
patches.links to an update from SuSE, too".
What about Debian?
HI,
I don't see Debian listed in the notification list at the bottom of the
CERT Advisory. Is there any estimate on the release of patched sendmail
packages?
Ramon Kagan
York University, Computing and Network Services
Unix Team - Intermediate System Administrator
(416)736-2100 #20263
[EMAIL PRO
On Mon, 03 Mar 2003 at 06:30:05PM +0300, Ant wrote:
> Hello ,
> Is there is any software to bypass http proxy
I think a combination of squid, sshd, putty and a modification to your
browsers proxy setting (to proxy through 127.0.0.1 on forwardedport) i
what you are looking for.
Port 22 not open/av
Try this: http://www.htthost.com/ , but use it on your own risk. It is a
real security hole. Better is to ask system administrator open some
rules on firewall for you.
Regards,
Martynas
Pr, 2003-03-03 17:30, Ant rašė:
> Hello ,
> Is there is any software to bypass http proxy
>
> --- --{
Is there is any software to bypass http proxy
Some kind of pptp via http $-).
try doing ppp-over-ssh
you launch ppp on the first end, tunel it through ssh and launch another
ppp on the other end.
Afair mini/VPN-HOWTO is about this...
BIGHard
--
() ascii |GIT d--- s: a--- C UL P+ L+++ E--
hey there
On Monday 03 March 2003 3:30 pm, Ant wrote:
> Hello ,
> Is there is any software to bypass http proxy
>
> --- --{Inet} -
>
> and win client after such proceess could work with any TCP/IP Services.
>
> Some kind of pptp via http $-).
>
if the proxy allows ssl tunneling, then qu
www.htthost.com
Citeren Ant <[EMAIL PROTECTED]>:
> Hello ,
> Is there is any software to bypass http proxy
>
> --- --{Inet} -
>
> and win client after such proceess could work with any TCP/IP Services.
>
> Some kind of pptp via http $-).
>
>
> Best regards,
> Ant
Hello ,
Is there is any software to bypass http proxy
--- --{Inet} -
and win client after such proceess could work with any TCP/IP Services.
Some kind of pptp via http $-).
Best regards,
Antmailto:[EMAIL PROTECTED]
On Mon, 03 Mar 2003 at 06:30:05PM +0300, Ant wrote:
> Hello ,
> Is there is any software to bypass http proxy
I think a combination of squid, sshd, putty and a modification to your
browsers proxy setting (to proxy through 127.0.0.1 on forwardedport) i
what you are looking for.
Port 22 not open/av
Try this: http://www.htthost.com/ , but use it on your own risk. It is a
real security hole. Better is to ask system administrator open some
rules on firewall for you.
Regards,
Martynas
Pr, 2003-03-03 17:30, Ant rašė:
> Hello ,
> Is there is any software to bypass http proxy
>
> --- --{
Is there is any software to bypass http proxy
Some kind of pptp via http $-).
try doing ppp-over-ssh
you launch ppp on the first end, tunel it through ssh and launch another
ppp on the other end.
Afair mini/VPN-HOWTO is about this...
BIGHard
--
() ascii |GIT d--- s: a--- C UL P+ L+++ E--- W
hey there
On Monday 03 March 2003 3:30 pm, Ant wrote:
> Hello ,
> Is there is any software to bypass http proxy
>
> --- --{Inet} -
>
> and win client after such proceess could work with any TCP/IP Services.
>
> Some kind of pptp via http $-).
>
if the proxy allows ssl tunneling, then qu
www.htthost.com
Citeren Ant <[EMAIL PROTECTED]>:
> Hello ,
> Is there is any software to bypass http proxy
>
> --- --{Inet} -
>
> and win client after such proceess could work with any TCP/IP Services.
>
> Some kind of pptp via http $-).
>
>
> Best regards,
> Ant
Hello ,
Is there is any software to bypass http proxy
--- --{Inet} -
and win client after such proceess could work with any TCP/IP Services.
Some kind of pptp via http $-).
Best regards,
Antmailto:[EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PR
37 matches
Mail list logo