Re: secure ident daemon

2005-03-24 Thread Rocky Olsen
I personally like the options made available in oidentd http://freshmeat.net/projects/oidentd On Sat, Mar 19, 2005 at 01:35:06PM +0100, LeVA wrote: > Hi! > > Can someone please suggest me a secure ident daemon. I can not choose from > the > apt searched list. > > Thanks! > > Daniel > > --

Re: apache and CAN-2004-0174

2005-03-24 Thread Joey Hess
Geoff Crompton wrote: > Similarly to my last email, is Debian's apache affected by this? Further > details on http://www.securityfocus.com/bid/9921. > > Debian is listed as being vulnerable. It's a DoS involving a connection > to a little used port. CAN-2004-0174 (Apache before 2.0.49, when usi

Re: apache and CAN-2003-0020

2005-03-24 Thread Joey Hess
Geoff Crompton wrote: > CAN-2003-0020 is a vulnerability in apache that mentions how apache > allows escape sequences into the error logs, which might exploit a > terminal program viewing them. > More detail is at http://www.securityfocus.com/bid/9930. The > securityfocus page lists Debian as be

Re: Apache 1.3.33 (from sarge) and mod_chroot

2005-03-24 Thread Daniel Steen
out of the box the sendmail application does not have the sgid bit set. The problem is that the /var/spool/mqueue-client folder that it tries to write to is not world writable. The solution to this is to set the sgid bit on the sendmail executable (in the choot env). -Dan Krzysztof Jóźwiak w

Automating security updates

2005-03-24 Thread Philippe Errembault
Hello Martin, I wondered how I could know if the installation of a security update needs or suggests manual re-configuration ? The idea is to automate as much as possible the installation of the upgrade, by triggering a script on the reception of your notification e-mail. Currently, I already mar

Re: Apache 1.3.33 (from sarge) and mod_chroot

2005-03-24 Thread Steve Kemp
On Thu, Mar 24, 2005 at 07:31:03AM +0100, Krzysztof J??wiak wrote: > My web server was hacked a few days ago and I decided to install some > new program and modules which improve security. Good plan. Did you find the source of the attack? If not you're at risk from a repeat of the previou