These torrents are not working with the Debian tracker.
http://cdimage.debian.org/debian-cd/7.6.0/source/bt-cd/debian-update-7.6.0-source-CD-1.iso.torrent
http://cdimage.debian.org/debian-cd/7.6.0/source/bt-cd/debian-update-7.6.0-source-CD-2.iso.torrent
Torrent Editor and also my Torrent softwa
Go to CD ISO Images, then Verify.
>
>
>
> On Jul 10, 2014, at 12:24 AM, Kitty Cat wrote:
>
> > Thanks.
> >
> > I'm new here. I was not on this list then. However, I just read the
> thread:
> >
> > https://lists.debian.org/debian-security/201
, Jul 09, 2014 at 06:29:09PM -0600, Kitty Cat wrote:
>
>> For years I have been concerned with MITM attacks on Debian mirrors.
>>
>
> We discussed this literally within the past couple of months on this list,
> at length. Have you read the archives, including the posts about
For years I have been concerned with MITM attacks on Debian mirrors.
I think the only valid solution would be to individually sign EACH package
with a valid GPG
signature from a trusted source.
I think EACH official package from Debian should be GPG signed by both
package maintainers and
also sig
Don't be alarmed, these are your overlords. Pay no attention. Go about your
business as usual as they try to take over the world.
https://www.youtube.com/watch?v=c9NAiojPzro
On Mon, Jul 05, 2010 at 02:23:03PM +0200, Wojciech Ziniewicz wrote:
> Personally i get 0-5 spam messages per month from the debian-isp and
> debian-security list that are not filtered and appear as non-spam messages.
> Moreover i see that in my spam folder i have like 3-7 spam messages per
> hour.
On Tue, May 20, 2008 at 08:20:04AM +0100, Alexandros Papadopoulos wrote:
> + I enabled password authentication in sshd_config (PasswordAuthentication
> yes)
> + aptitude update && aptitude dist-upgrade, which updated the packages
> and restarted the openssh daemon
> + shortly thereafter my SSH co
On Tue, May 20, 2008 at 12:52:54AM -0600, Michael Loftis wrote:
> MaxStartups.
Ah. That'd do it. First time I hit that. Thanks and sorry for the noise.
On the down side it seems people are already starting to exploit the
blacklisted keys.
--
"Police noticed some rustling sounds from Linn's bo
I got connections from an unknown IP to openssh today. openssh logged:
Public key ... blacklisted (see ssh-vulnkey(1))
19 times, each time with a different key and then ssh would not respond
any more and connections to it froze like so:
$ ssh [EMAIL PROTECTED] -v
OpenSSH_4.3p2 Debian-9etch1, Ope
On Thu, May 15, 2008 at 09:03:24AM -0400, Noah Meyerhans wrote:
> On Thu, May 15, 2008 at 11:08:58AM +0300, Mikko Rapeli wrote:
> > I think, and hope, Debian openssh packages will be updated too.
>
> Yes, expect it within hours.
I'm curious... is there a way to get ssh-vulnkey to print out the li
On Fri, May 16, 2008 at 07:47:31AM +0200, Yves-Alexis Perez wrote:
> On jeu, 2008-05-15 at 23:38 +0200, Steffen Schulz wrote:
> > or what its worth...I see 3.5 problems that accumulated into this
> > mess:
> >
> > - OpenSSL is complex and critical but the code is little documented.
> > Code piec
On Wed, May 14, 2008 at 07:33:43PM +0200, Jan Luehr wrote:
> >To check all your own keys, assuming they are in the standard
> >locations (~/.ssh/id_rsa, ~/.ssh/id_dsa, or ~/.ssh/identity):
> >
> > ssh-vulnkey
>
> I took a look at it and found two large blacklist containing lots of key
On Wed, May 14, 2008 at 12:17:14PM +0200, Jan Luehr wrote:
> > 1. Install the security updates
> >
> >This update contains a dependency on the openssl update and will
> >automatically install a corrected version of the libss0.9.8 package,
> >and a new package openssh-blacklist.
> >
> >
On Wed, Jun 26, 2002 at 02:11:00PM +0200, InfoEmergencias - Luis G?mez wrote:
> IMHO, we'd better set it to no. I always thought it was much better. Is
> there any landscape in which you may want to allow direct root login to
> your host?
rsync where you want to keep userid/groupid info.
--
GOVE
On Wed, Jan 23, 2002 at 06:39:44PM -0600, David Ehle wrote:
> Kriss,
>
> This has to be the most interesting piece of SPAM i've ever run across...
> but this is NOT the correct forum for it. Please refrain from sending
> anything not pertaining to Debian Security to this list in the future.
I wou
On Wed, Jan 23, 2002 at 06:39:44PM -0600, David Ehle wrote:
> Kriss,
>
> This has to be the most interesting piece of SPAM i've ever run across...
> but this is NOT the correct forum for it. Please refrain from sending
> anything not pertaining to Debian Security to this list in the future.
I wo
t of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
--
CaT"As you can expect it's really affecting my sex life. I can't help
it. Each time my wife initiates sex, these ejaculating hippos keep
floating through my mind."
- M
unsubscribe to be unsubscribed,
> hopefully that will work...
He'll probably have to confirm and not do it.
--
CaT"As you can expect it's really affecting my sex life. I can't help
it. Each time my wife initiates sex, these ejaculating hippos keep
f "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
--
CaT"As you can expect it's really affecting my sex life. I can't help
it. Each time my wife initiates sex, these ejaculating hippos keep
floating through my mind."
- Mohd
t of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
--
CaT"As you can expect it's really affecting my sex life. I can't help
it. Each time my wife initiates sex, these ejaculating hippos keep
floating through my mind."
- M
unsubscribe to be unsubscribed,
> hopefully that will work...
He'll probably have to confirm and not do it.
--
CaT"As you can expect it's really affecting my sex life. I can't help
it. Each time my wife initiates sex, these ejaculating hippos keep
f "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
--
CaT"As you can expect it's really affecting my sex life. I can't help
it. Each time my wife initiates sex, these ejaculating hippos keep
floating through my mind."
On Sun, Jul 22, 2001 at 02:08:36AM -0700, Jacob Meuser wrote:
> On Sun, Jul 22, 2001 at 06:35:34PM +1000, CaT wrote:
> > On Sun, Jul 22, 2001 at 01:37:29AM -0700, Jacob Meuser wrote:
> > > For the last time: I am saying that apt-get install should not immediately
> > &
o block vulnerable services when they are
> installed and then tell you how to unblock them. Maybe a billion
> different ways it could be, but it's not. I must commend the Debian team
> for maintaining the best distro, IMNSHO. I thought the Debian community
aye. we're dumping redhat/s
don't try to steer me off course, and then say I keep changing
> my position. It's simply not polite, and rather silly.
Noone is steering you offcourse. You're doing just that. You mention
that OpenBSD has been secure out-of-the-box for 4yrs and then when
ppl aren't imp
On Sat, Jul 21, 2001 at 08:51:23PM -0700, Jacob Meuser wrote:
> On Sun, Jul 22, 2001 at 12:54:49PM +1000, CaT wrote:
> >
> > You know. You're right. We should make it as difficult as possible
> > to install software. Right down to removing makefiles from source
> &g
e hole was discovered.
>
> And so the default install was not vulnerable to remote attacks. Like
Debian's default install is not vulnerable to attacks either. Your point?
--
CaT ([EMAIL PROTECTED]) *** Jenna has joined the channel.
speakin
On Sun, Jul 22, 2001 at 02:08:36AM -0700, Jacob Meuser wrote:
> On Sun, Jul 22, 2001 at 06:35:34PM +1000, CaT wrote:
> > On Sun, Jul 22, 2001 at 01:37:29AM -0700, Jacob Meuser wrote:
> > > For the last time: I am saying that apt-get install should not immediately
> > &
o block vulnerable services when they are
> installed and then tell you how to unblock them. Maybe a billion
> different ways it could be, but it's not. I must commend the Debian team
> for maintaining the best distro, IMNSHO. I thought the Debian community
aye. we're dumping redhat/s
don't try to steer me off course, and then say I keep changing
> my position. It's simply not polite, and rather silly.
Noone is steering you offcourse. You're doing just that. You mention
that OpenBSD has been secure out-of-the-box for 4yrs and then when
ppl aren't imp
On Sat, Jul 21, 2001 at 08:51:23PM -0700, Jacob Meuser wrote:
> On Sun, Jul 22, 2001 at 12:54:49PM +1000, CaT wrote:
> >
> > You know. You're right. We should make it as difficult as possible
> > to install software. Right down to removing makefiles from source
> &g
e hole was discovered.
>
> And so the default install was not vulnerable to remote attacks. Like
Debian's default install is not vulnerable to attacks either. Your point?
--
CaT ([EMAIL PROTECTED])*** Jenna has joined the channel.
speakin
ult. The
trick is in informing the user about what they just did and what
consequences it may have for them.
--
CaT ([EMAIL PROTECTED]) *** Jenna has joined the channel.
speaking of mental giants..
me, a giant, bullshit
ult. The
trick is in informing the user about what they just did and what
consequences it may have for them.
--
CaT ([EMAIL PROTECTED])*** Jenna has joined the channel.
speaking of mental giants..
me, a giant, bullshi
f or the system
as a whole.
--
CaT ([EMAIL PROTECTED]) *** Jenna has joined the channel.
speaking of mental giants..
me, a giant, bullshit
And i'm not mental
f or the system
as a whole.
--
CaT ([EMAIL PROTECTED])*** Jenna has joined the channel.
speaking of mental giants..
me, a giant, bullshit
And i'm not mental
be very very helpfull.
http://www.kerneli.org/
--
CaT ([EMAIL PROTECTED])
'He had position, but I was determined to score.'
-- Worf, DS9, Season 5: 'Let He Who Is Without Sin...'
be very very helpfull.
http://www.kerneli.org/
--
CaT ([EMAIL PROTECTED])
'He had position, but I was determined to score.'
-- Worf, DS9, Season 5: 'Let He Who Is Without Sin...'
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
ve a .debian or whatnot
> > dir in there to store all such things (or most of them/some of them)
>
> this is becoming a question for debian-devel or perhaps debian-policy.
Yup. It was just a sidethought at any rate.
> > > FHS may answer some of these questions too.
> >
On Fri, Sep 08, 2000 at 06:33:01PM -0800, Ethan Benson wrote:
> On Sat, Sep 09, 2000 at 01:16:19PM +1100, CaT wrote:
>
> >
> > For my system:
> >
> > [13:09:22] [EMAIL PROTECTED]:/root>> find /var -perm +o+w -mount
> > [13:09:26] [EMAIL PROTECT
ve problems enforce quotas on /var
> ::>(which can be much smaller then /home quotas, say 5 or 10 MB) that is
> ::>what i do.
> ::>
> ::>--
> ::>Ethan Benson
> ::>http://www.alaska.net/~erbenson/
--
CaT ([EMAIL PROTECTED])
'He had position, but
On Fri, Sep 08, 2000 at 05:52:42PM -0800, Ethan Benson wrote:
> On Sat, Sep 09, 2000 at 12:00:19AM +1100, CaT wrote:
> > What screen does there is to create subdirs which are then used
> > to hold a users pipes. Now these subdirs are owned by the user
> > that runs screen. Th
ve a .debian or whatnot
> > dir in there to store all such things (or most of them/some of them)
>
> this is becoming a question for debian-devel or perhaps debian-policy.
Yup. It was just a sidethought at any rate.
> > > FHS may answer some of these questions too.
> >
On Fri, Sep 08, 2000 at 06:33:01PM -0800, Ethan Benson wrote:
> On Sat, Sep 09, 2000 at 01:16:19PM +1100, CaT wrote:
>
> >
> > For my system:
> >
> > [13:09:22] root@nessie:/root>> find /var -perm +o+w -mount
> > [13:09:26] root@nessie:/root>>
e above problems enforce quotas on /var
> ::>(which can be much smaller then /home quotas, say 5 or 10 MB) that is
> ::>what i do.
> ::>
> ::>--
> ::>Ethan Benson
> ::>http://www.alaska.net/~erbenson/
--
CaT ([EMAIL PROTECTED])
'He had position, but
On Fri, Sep 08, 2000 at 05:52:42PM -0800, Ethan Benson wrote:
> On Sat, Sep 09, 2000 at 12:00:19AM +1100, CaT wrote:
> > What screen does there is to create subdirs which are then used
> > to hold a users pipes. Now these subdirs are owned by the user
> > that runs screen. Th
On Fri, Sep 08, 2000 at 02:06:15PM +0100, Tim Haynes wrote:
> CaT <[EMAIL PROTECTED]> writes:
>
> [snip sensible stuff]
> > As such I reckon it's best if the screen directory is left in /tmp where
> > the authors initially put it. It's inconvenient but
On Fri, Sep 08, 2000 at 09:12:38AM -0400, Michael Stone wrote:
> On Sat, Sep 09, 2000 at 12:00:19AM +1100, CaT wrote:
> > a. a possible way around quotas set on /home b. a method of fully
> > filling up /var, thereby potentially causing log entries to be
> > lost which, in
It's inconvenient but
doesn't cause the problems above.
--
CaT ([EMAIL PROTECTED])
'He had position, but I was determined to score.'
-- Worf, DS9, Season 5: 'Let He Who Is Without Sin...'
On Fri, Sep 08, 2000 at 02:06:15PM +0100, Tim Haynes wrote:
> CaT <[EMAIL PROTECTED]> writes:
>
> [snip sensible stuff]
> > As such I reckon it's best if the screen directory is left in /tmp where
> > the authors initially put it. It's inconvenient but
On Fri, Sep 08, 2000 at 09:12:38AM -0400, Michael Stone wrote:
> On Sat, Sep 09, 2000 at 12:00:19AM +1100, CaT wrote:
> > a. a possible way around quotas set on /home b. a method of fully
> > filling up /var, thereby potentially causing log entries to be
> > lost which, in
ut it. It's inconvenient but
doesn't cause the problems above.
--
CaT ([EMAIL PROTECTED])
'He had position, but I was determined to score.'
-- Worf, DS9, Season 5: 'Let He Who Is Without Sin...'
--
To UNSUBSCRIBE, email to [EMAIL PROTEC
52 matches
Mail list logo