Please help test Snort 2.3.0 (experimental) packages

2005-02-08 Thread Javier Fernández-Sanguino Peña
Hi everyone, I've recently uploaded (to experimental only) new Snort 2.3.0 packages (based on the release made by the Snort team last January 25th). One of the main reasons I've uploaded this to experimental (and not sid) is that I've introduced /etc/default/snort and made /etc/snort/snort.comm

bind vulnerabilities

2005-02-08 Thread Geoff Crompton
SecurityFocuse newsletter #286 lists some bind issues: http://www.securityfocus.com/bid/12364 CAN-2005-0033 http://www.securityfocus.com/bid/12365 CAN-2005-0034 Anyone know how Debian stands with these? -- Geoff Crompton Debian System Administrator Strategic Data +61 3 9340 9000 -- To UNSUBSCRI

Ghostscript Multiple Local Insecure Temporary File Creation

2005-02-08 Thread Geoff Crompton
Anyone know if gs-gpl is affected by the issues mentioned at http://www.securityfocus.com/bid/12327? (Asstute readers will realise that I'm going through the securityfocuse newsletter #285.) -- Geoff Crompton Debian System Administrator Strategic Data +61 3 9340 9000 -- To UNSUBSCRIBE, email to

debian and CAN-2004-1237 vulnerability?

2005-02-08 Thread Geoff Crompton
Anyone know if any Debian kernels are vulnerable to CAN-2004-1237? Apparently it was originally just thought to be a redhat thing, but bugtraq recently said it was also found in suse. -- Geoff Crompton Debian System Administrator Strategic Data +61 3 9340 9000 -- To UNSUBSCRIBE, email to [EMAIL

apache utilities insecure temp file creation vulnerability

2005-02-08 Thread Geoff Crompton
Has there been a DSA for apache, in relation to the securityfocus bugtraqID #12308? http://www.securityfocus.com/bid/12308 Cheers -- Geoff Crompton Debian System Administrator Strategic Data +61 3 9340 9000 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Co

Re: IDNA and security

2005-02-08 Thread Michael Stone
On Tue, Feb 08, 2005 at 10:40:22PM -0200, Henrique de Moraes Holschuh wrote: Your point being? We all know how well that little padlock works... The point being that, good or bad, right or wrong, that's how the net works. Mike Stone -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "

Re: IDNA and security

2005-02-08 Thread Henrique de Moraes Holschuh
On Tue, 08 Feb 2005, Michael Stone wrote: > On Tue, Feb 08, 2005 at 10:29:43PM +0100, Florian Weimer wrote: > >IMHO, the whole underlying idea that you can use a name to tell if a > >site is trustworthy is flawed. The net just doesn't work this way. > > Yes it does. Ecommerce security is founded

Re: IDNA and security

2005-02-08 Thread Michael Stone
On Tue, Feb 08, 2005 at 05:16:20PM -0500, Joey Hess wrote: And if you have trusted that little padlock with anything important anytime recently without at least making sure you have reasonable insurance, you've not been paying attention. Welcome to the internet. Just getting users to verify that th

Re: IDNA and security

2005-02-08 Thread Florian Weimer
* Joey Hess: > Florian Weimer wrote: >> People are filing security bugs because of the homograph issue. But >> is this a real security problem? Do you think we should change our >> fonts so that 1, l and I (and O and 0, of course) are more different >> visually? > > That misses part of the point

Re: IDNA and security

2005-02-08 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > The name is what associates a CA signature with a site. They're not > signing the IP number. The Browser is checking the address agaist the DN itself. So if the padlock is blue, the certificate is for the current URL. Then you have to check the content

Re: IDNA and security

2005-02-08 Thread Florian Weimer
* Michael Stone: > On Tue, Feb 08, 2005 at 10:59:44PM +0100, Florian Weimer wrote: >>Uh-oh. No. It appears if someone has paid a few bucks to someone >>else. This has got nothing to do with names, they are not verified by >>most CAs. > > The name is what associates a CA signature with a site. T

Re: IDNA and security

2005-02-08 Thread Joey Hess
Florian Weimer wrote: > People are filing security bugs because of the homograph issue. But > is this a real security problem? Do you think we should change our > fonts so that 1, l and I (and O and 0, of course) are more different > visually? That misses part of the point of the homograph issue

Re: IDNA and security

2005-02-08 Thread Michael Stone
On Tue, Feb 08, 2005 at 10:59:44PM +0100, Florian Weimer wrote: Uh-oh. No. It appears if someone has paid a few bucks to someone else. This has got nothing to do with names, they are not verified by most CAs. The name is what associates a CA signature with a site. They're not signing the IP numb

Re: IDNA and security

2005-02-08 Thread Florian Weimer
* Michael Stone: > On Tue, Feb 08, 2005 at 10:29:43PM +0100, Florian Weimer wrote: >>IMHO, the whole underlying idea that you can use a name to tell if a >>site is trustworthy is flawed. The net just doesn't work this way. > > Yes it does. Ecommerce security is founded on the idea that if the > l

Re: IDNA and security

2005-02-08 Thread Michael Stone
On Tue, Feb 08, 2005 at 10:29:43PM +0100, Florian Weimer wrote: IMHO, the whole underlying idea that you can use a name to tell if a site is trustworthy is flawed. The net just doesn't work this way. Yes it does. Ecommerce security is founded on the idea that if the little padlock is lit up you're

IDNA and security

2005-02-08 Thread Florian Weimer
People are filing security bugs because of the homograph issue. But is this a real security problem? Do you think we should change our fonts so that 1, l and I (and O and 0, of course) are more different visually? IMHO, the whole underlying idea that you can use a name to tell if a site is trust

Re: [SECURITY] [DSA 671-1] New xemacs21 packages fix arbitrary code execution

2005-02-08 Thread Steve Kemp
On Tue, Feb 08, 2005 at 04:58:36PM +0100, Frank K?ster wrote: > I find the text of this advisory really confusing - the subject and > Package line talk about xemacs21, the description about "Emacs, the > well-known editor" and "your emacs packages". If it isn't sufficiently > confusing to make xem

Re: [SECURITY] [DSA 671-1] New xemacs21 packages fix arbitrary code execution

2005-02-08 Thread Frank Küster
[EMAIL PROTECTED] (Martin Schulze) schrieb: > Package: xemacs21 [...] > Max Vozeler discovered several format string vulnerabilities in the > movemail utility of Emacs, the well-known editor. Via connecting to a > malicious POP server an attacker can execute arbitrary code under the > pri

UNSUBSCRIBE

2005-02-08 Thread jmakamson
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Tuesday, February 08, 2005 9:08 AM To: debian-security-announce@lists.debian.org Subject: [SECURITY] [DSA 671-1] New xemacs21 packages fix arbitrary code execution -BEGIN PGP SIGNED MESSAGE- Hash: SHA1

Re: Mirrors security

2005-02-08 Thread Brendan O'Dea
On Tue, Feb 08, 2005 at 03:17:12AM -0200, Felipe Massia Pereira wrote: >Do I really have to check all .deb files of Packages files if I have >already checked all Packages' files themselves and they do check? AFAIK >apt-get always check if md5 (from Packages files it downloads) does not >match an