Hello,
Why put it there if there is already a perfectly good standard, RFC 2369 (from
1998!, so about as new as IPv6) that describes where to put the mailing list
information: in the headers of the mail.
And guess what? That's exactly where the Debian lists already places this
information.
Hello,
Where can I find a suitable policy? The package selinux-policy-default is no
longer available, and I cannot find a suitable replacement in Jessie/main.
Regards,
Bart-Jan Vrielink
On 12/16/11 21:53, Freddy Spierenburg wrote:
Hi (first message) Bart-Jan and (second) Marko,
On Fri, Dec 16, 2011 at 09:32:05PM +0100, Bart-Jan Vrielink wrote:
You shouldn't be able to strace suid programs.
Please enlighten me, why not?
suid/setuid means that the program
On 12/16/11 21:47, Marko Randjelovic wrote:
All looks OK. Just there is a dot after permissions in "ls -l".
That dot is an indication that there are extended attributes (like
selinux) associated with the file. Try ls -Z on the file if you're curious.
On 12/16/2011 09:
On 12/16/11 21:07, Freddy Spierenburg wrote:
Hi Marko,
On Fri, Dec 16, 2011 at 08:51:58PM +0100, Marko Randjelovic wrote:
su does not ask for a password, just exits imediately with exit status 1.
Have you already tried to strace it, to possibly see what's going
on? And if so, where d
Matthias Faulstich wrote:
Since a new server-installation, for which I used a numer of configuration
files from an older server, there are messages like this in
/var/log/auth.log :
Jul 11 06:25:01 area51 su[7884]: (pam_unix) account nobody has password
changed in future
stat for /etc/passwd
On Mon, 2004-10-11 at 12:46, LeVA wrote:
> I have installed postfix from sources a while ago, and now there is a
> security update fro sendmail. As you probably know, I can not remove
> the sendmail package (although I'm not using it), because it would
> remove apache and many other packages wi
On Mon, 2004-08-09 at 20:23, Andreas Schmidt wrote:
> On 2004.08.09 15:53, Juha Pahkala wrote:
>
> > Aug 9 16:40:01 server /USR/SBIN/CRON[1103]: (root) CMD
> > (/root/bin/util/check_irexec)
> > Aug 9 16:40:01 server /USR/SBIN/CRON[1104]: (root) CMD
> > (/root/bin/util/check_mythbackend)
> >
> >
On Tue, 2004-05-04 at 14:45, Marcin wrote:
> I am using debian postfix. When a mail from the PHP (under apache) the mail
> header contain:
> ---
> Return-Path: <[EMAIL PROTECTED]>
> ---
>
> I want to hide only this ONE user.
> It is possible ?
>
> header_checks with:
> /^Return-Path: /
On Tue, 2004-05-04 at 14:45, Marcin wrote:
> I am using debian postfix. When a mail from the PHP (under apache) the mail header
> contain:
> ---
> Return-Path: <[EMAIL PROTECTED]>
> ---
>
> I want to hide only this ONE user.
> It is possible ?
>
> header_checks with:
> /^Return-Path: /
On Thu, 2003-04-03 at 12:43, Yoss wrote:
> Why PHP is parsing file with ".php.txt" extension? I think that is a
> security hole, because in easy way we can imagine that thereis php
> script that should allow to upload only .txt files. 99% of coders will
> check this with /.+?\.txt$/ because this i
On Thu, 2003-04-03 at 12:43, Yoss wrote:
> Why PHP is parsing file with ".php.txt" extension? I think that is a
> security hole, because in easy way we can imagine that thereis php
> script that should allow to upload only .txt files. 99% of coders will
> check this with /.+?\.txt$/ because this i
ccess to
any host that compiled a version of tcpdump with this Trojan horse. The
privilege level under which this malicious code would be executed would
be that of the user who compiled the source code.
"... any host that compiled ..." means to me that the Debian packages
shouldn't be affected.
--
Tot ziens,
Bart-Jan Vrielink
e access to
any host that compiled a version of tcpdump with this Trojan horse. The
privilege level under which this malicious code would be executed would
be that of the user who compiled the source code.
"... any host that compiled ..." means to me that the Debian packages
shouldn&
. Netgroup is a nice way to group a number of hosts
and/or users together. You can then use it for example to export a
certain NFS filesystem to the netgroup @workstations. Just leave that
line as it is now.
--
Tot ziens,
Bart-Jan Vrielink
ay to group a number of hosts
and/or users together. You can then use it for example to export a
certain NFS filesystem to the netgroup @workstations. Just leave that
line as it is now.
--
Tot ziens,
Bart-Jan Vrielink
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
-numbered udp
port as a source for recursive queries, unless the query-source option
is set.
--
Tot ziens,
Bart-Jan Vrielink
-numbered udp
port as a source for recursive queries, unless the query-source option
is set.
--
Tot ziens,
Bart-Jan Vrielink
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
On Tue, 2002-06-11 at 11:39, Javier Fernández-Sanguino Peña wrote:
> On Mon, Jun 10, 2002 at 01:17:02PM -0400, James wrote:
> > I use: netstat -vat | grep LISTEN
> >
> > That will tell you everything that is really listening on your server.
> >
> Not really, IIRC it will not show you udp s
On Mon, 2002-04-22 at 12:36, Nik Engel wrote:
> On Mon, 22 Apr 2002, martin f krafft wrote:
> > > Meaning to say, htaccess ist only working from outside. But when i
> > > want
> > > to reache the apache sever from the inside network i don need to
> > > authenticate ?
> >
> > Order Allow,Deny
> >
On Mon, 2002-04-22 at 12:36, Nik Engel wrote:
> On Mon, 22 Apr 2002, martin f krafft wrote:
> > > Meaning to say, htaccess ist only working from outside. But when i
> > > want
> > > to reache the apache sever from the inside network i don need to
> > > authenticate ?
> >
> > Order Allow,Deny
> >
On Fri, 2002-04-12 at 13:27, VERBEEK, Francois wrote:
> BTW if you plan to use --dport you need rather a line like
>
> iptables -A INPUT -p tcp -s 0/0 -m tcp --dport 22 -i $dev -j ACCEPT
-m tcp is not needed. See manpage:
MATCH EXTENSIONS
iptables can use extended packet matching modules.
On Fri, 2002-04-12 at 13:27, VERBEEK, Francois wrote:
> BTW if you plan to use --dport you need rather a line like
>
> iptables -A INPUT -p tcp -s 0/0 -m tcp --dport 22 -i $dev -j ACCEPT
-m tcp is not needed. See manpage:
MATCH EXTENSIONS
iptables can use extended packet matching modules
On Fri, 26 Oct 2001, Rishi L Khan wrote:
> Set the shell for the user in /etc/passwd to a script that chroots and
> then spawns a shell.
That is very difficult to do. Chroot can only be run by root.
> On Fri, 26 Oct 2001, Javier [iso-8859-1] Fernández-Sanguino Peña wrote:
>
> > I have been asked
On Fri, 26 Oct 2001, Rishi L Khan wrote:
> Set the shell for the user in /etc/passwd to a script that chroots and
> then spawns a shell.
That is very difficult to do. Chroot can only be run by root.
> On Fri, 26 Oct 2001, Javier [iso-8859-1] Fernández-Sanguino Peña wrote:
>
> > I have been aske
On Thu, 19 Jul 2001, Brian Rectanus wrote:
> Anyone seen this before? I have looked around for similar attacks, but
> cannot find any info. I assume that is a unicode string padded out with
> Ns. How would I go about finding out what is in the string?
>
>
> xxx.xxx.xxx.xxx - - [19/Jul/2001:14:2
On Thu, 19 Jul 2001, Brian Rectanus wrote:
> Anyone seen this before? I have looked around for similar attacks, but
> cannot find any info. I assume that is a unicode string padded out with
> Ns. How would I go about finding out what is in the string?
>
>
> xxx.xxx.xxx.xxx - - [19/Jul/2001:14:
On Thu, 12 Jul 2001, Martin Domig wrote:
> As I am using snort I keep getting many warnings in my logfiles which I
> don't know what they mean. For example the following entry:
>
> Jul 11 01:17:46 keeper snort[6079]: IDS266 - CAN-1999-0261 - SMTP Chameleon
> Overflow: xxx.xxx.xxx.xxx:44772 -> yyy.
On Thu, 12 Jul 2001, Martin Domig wrote:
> As I am using snort I keep getting many warnings in my logfiles which I
> don't know what they mean. For example the following entry:
>
> Jul 11 01:17:46 keeper snort[6079]: IDS266 - CAN-1999-0261 - SMTP Chameleon
> Overflow: xxx.xxx.xxx.xxx:44772 -> yyy
29 matches
Mail list logo