Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Henrique de Moraes Holschuh
On Sat, 02 Apr 2005, Florian Ernst wrote: > I personally do, but for some people information might be better suited > if it is explicitely spelled out... Just the ldd output alone would Sure. But I hope my post will make people at least read ldd(1)... That was the whole point. A new trick on th

Sorry, wrong list. Please ignore - Re: Logrotate failing for apache logs

2005-04-01 Thread Malcolm Ferguson
Malcolm Ferguson wrote: Sorry, wrong list. I meant to send to debian-user. Malc -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Florian Ernst
On Fri, Apr 01, 2005 at 06:03:25PM -0300, Henrique de Moraes Holschuh wrote: > On Fri, 01 Apr 2005, Florian Ernst wrote: > > Taken from /usr/share/doc/ssh/README.Debian.gz, more confirmation > > could be taken from downloading and checking the Debian sources. > > ldd is your friend. Use it... I p

Logrotate failing for apache logs

2005-04-01 Thread Malcolm Ferguson
I've just rebuild my server and now it appears that logrotate is failing for apache: wolverine:/var/log# logrotate /etc/logrotate.d/apache error running shared postrotate script for /var/log/apache/*.log I've run the above command through strace and it looks like logrotate creates a file in /tmp

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Henrique de Moraes Holschuh
On Fri, 01 Apr 2005, Florian Ernst wrote: > Taken from /usr/share/doc/ssh/README.Debian.gz, more confirmation > could be taken from downloading and checking the Debian sources. ldd is your friend. Use it... -- "One disk to rule them all, One disk to find them. One disk to bring them all and

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Chris Adams
On Apr 1, 2005, at 12:10 PM, Henrique de Moraes Holschuh wrote: On Fri, 01 Apr 2005, martin f krafft wrote: also sprach Chris Adams <[EMAIL PROTECTED]> [2005.04.01.2143 +0200]: you somewhat from casual attacks against weak passwords: if I obtain a copy of a user's password a public-key-only policy

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Florian Ernst
Hello *, On Fri, Apr 01, 2005 at 02:05:29PM -0600, Brad Sims wrote: > On Thursday 31 March 2005 11:14 pm, Alvin Oga wrote: > > but make sure ssh is compiled with tcpwarppers, otherwise that > > lines are worthless > > How are they compiled by default on Sid? > > I think that ssh must be compiled

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Henrique de Moraes Holschuh
On Fri, 01 Apr 2005, martin f krafft wrote: > also sprach Chris Adams <[EMAIL PROTECTED]> [2005.04.01.2143 +0200]: > > you somewhat from casual attacks against weak passwords: if > > I obtain a copy of a user's password a public-key-only policy > > means that I still need some sort of privileged ac

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Brad Sims
On Thursday 31 March 2005 11:14 pm, Alvin Oga wrote: > but make sure ssh is compiled with tcpwarppers, otherwise that > lines are worthless How are they compiled by default on Sid? I think that ssh must be compiled that way by default as I had to add $WorkIP2 to allow access from that machine...

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread martin f krafft
also sprach Chris Adams <[EMAIL PROTECTED]> [2005.04.01.2143 +0200]: > you somewhat from casual attacks against weak passwords: if > I obtain a copy of a user's password a public-key-only policy > means that I still need some sort of privileged access to their > home directory to exploit it - far f

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Chris Adams
On Apr 1, 2005, at 6:23 AM, Michael Stone wrote: On Fri, Apr 01, 2005 at 01:23:09AM -0800, Chris Adams wrote: Or no passwords - if requiring public key authentication is feasible for a system you can disable password authentication entirely: I generally consider that to be a horrible idea. Instead

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Michael Stone
On Fri, Apr 01, 2005 at 12:11:29PM -0300, Henrique de Moraes Holschuh wrote: Nowadays user passwords often end up being stolen, not broken (trojans, etc). Keys offer no degraded security in that scenario. Wrong. It's much harder to force people to change keys than passwords. It's not impossible,

Cordula Sonnhalter ist nicht verfügbar : [SECURITY] [DSA 697-1] New netkit-telnet packages fix arbitrary code execution

2005-04-01 Thread cordula . sonnhalter
Ich werde ab 24.03.2005 nicht im Büro sein. Ich kehre zurück am 13.04.2005. Bei dringenden Anfragen wenden Sie sich bitte an meinen Vertreter Thomas Mirbeth. Mit freundlichen Grüßen, Cordula Sonnhalter Ursprüngliches Thema: [SECURITY] [DSA 697-1] New netkit-telnet packages fix arbitrary code

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Michael Stone
On Fri, Apr 01, 2005 at 04:59:40PM +0200, Philipp Schulte wrote: Sure, maybe a user does not handle the key carefully but do you think they are more careful with their password and don't write it down or something like this? I'd rather have them write it down. Paper isn't subject to remote exploits

PAM Limits

2005-04-01 Thread Gearry Judkins
I am looking for some good suggestions for setting limits in the limits.conf file. I am reading the Securing Debian Guide, and it notes that some suggestions should be added ;). I searched around the net and found good descriptions of what you can set, but not many suggested default limits. I un

Re: sshd: "Generating new 768..." ?

2005-04-01 Thread martin f krafft
also sprach Michelle Konzack <[EMAIL PROTECTED]> [2005.04.01.1651 +0200]: > | Apr 1 00:15:48 samba3 sshd[20455]: Generating 768 bit RSA key. > | Apr 1 00:15:48 samba3 sshd[20455]: RSA key generation complete. That's the actual key used to negotiate connection keys. It is being regenerated once a

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Henrique de Moraes Holschuh
On Fri, 01 Apr 2005, Michael Stone wrote: > On Fri, Apr 01, 2005 at 01:23:09AM -0800, Chris Adams wrote: > >Or no passwords - if requiring public key authentication is feasible > >for a system you can disable password authentication entirely: > > I generally consider that to be a horrible idea. I

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Philipp Schulte
Michael Stone wrote: > On Fri, Apr 01, 2005 at 01:23:09AM -0800, Chris Adams wrote: > >Or no passwords - if requiring public key authentication is feasible > >for a system you can disable password authentication entirely: > > I generally consider that to be a horrible idea. Instead of centrally

sshd: "Generating new 768..." ?

2005-04-01 Thread Michelle Konzack
Hello, for some seconds I have checked the daily sshd log and seen this: __( '/var/log/sshd.log' )_ / | Apr 1 00:15:47 samba3 sshd[6789]: Received SIGHUP; restarting. | Apr 1 00:15:48 samba3 sshd[20455]: socket: Address family not supported by pro

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Michael Stone
On Fri, Apr 01, 2005 at 01:23:09AM -0800, Chris Adams wrote: Or no passwords - if requiring public key authentication is feasible for a system you can disable password authentication entirely: I generally consider that to be a horrible idea. Instead of centrally managed password policies you now h

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Javier Fernández-Sanguino Peña
On Thu, Mar 31, 2005 at 10:44:53PM -0600, Brad Sims wrote: > > Will not having the usual all: local break something? Yes: $ ldd `which portmap` libwrap.so.0 => /lib/libwrap.so.0 (0x4003) libnsl.so.1 => /lib/libnsl.so.1 (0x40039000) libc.so.6 => /lib/libc.so.6 (0x4004e

Re: Darn skiddies (ssh login attempts)

2005-04-01 Thread Chris Adams
On Mar 31, 2005, at 11:40 PM, Robert Lemmen wrote: On Thu, Mar 31, 2005 at 10:44:53PM -0600, Brad Sims wrote: `less /var/log/auth.log|grep Failed|wc -l` shows 185 attempts to compromise my machine since March 27th... of course the only thing that really helps is good passwords, Or no passwords - i