Re: Two HDD on Desktop PC

2019-08-04 Thread Joe
, and a great deal of detail needs to be known to offer more specific advice on encryption. And would you like to use an encrypted system without fully understanding what was done? -- Joe

Re: About TCP issue in kernel 3.6 - 4.6

2016-08-15 Thread Joe Gray
Unsubscribe Sent from my mobile. Please excuse the brevity, spelling, and punctuation. Joe Gray, CISSP-ISSMP, GSNA, GCIH Founder and Chief Nerd > On Aug 15, 2016, at 9:42 AM, Salvatore Bonaccorso wrote: > > Hi Francisco, > >> On Mon, Aug 15, 2016 at 03:36:42PM +0200, f

Re: [SECURITY] [DSA 3643-1] kde4libs security update

2016-08-06 Thread Joe Gray
Unsubscribe Sent from my mobile. Please excuse the brevity, spelling, and punctuation. > On Aug 6, 2016, at 4:00 PM, Javier BurĂ³n wrote: > > unsubscribe > >> On 6 August 2016 at 20:53, Salvatore Bonaccorso wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA512 >> >> - ---

Re: Shellshock: Has CVE-2014-7186 and CVE-2014-7187 been addressed for debian

2014-09-27 Thread Joe
OT QUITE . fixed in stable [wheezy] > and "oldstable-LTS" [squeeze-lts] > > > BUT NOT oldstable [squeeze] it is NOT fixed, > nor is it still supported. :( > But just add the right incantations to sources.list and all will be well. -- Joe -- To UNSU

Re: Shellshock: Has CVE-2014-7186 and CVE-2014-7187 been addressed for debian

2014-09-27 Thread Joe
either, the first, and the second patches: https://access.redhat.com/articles/1200223 -- Joe -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20140927203808.12db7...@jresid.jretrading.com

Re: pc is compromised

2014-03-14 Thread Joe
S compromises about. As you are comfortable with wireshark, have a look at the destination IP addresses of DNS lookups, see if they are what you expect. Man-in-the-middle attacks are harder than DNS server address substitution. -- Joe -- To UNSUBSCRIBE, email to debian-security-requ...@lists.deb

Re: Compromising Debian Repositories

2013-08-05 Thread Joe
ally possible, perhaps involving the outright purchase or intimidation of a few hundred humans, then the largest organised crime syndicates on the planet (a.k.a. governments) will do it. -- Joe -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubsc

tonight

2011-11-29 Thread Joe Bouchard
I'm going to give Jim Drake a ride to Biddeford to pick up his Jeep which is getting a new windshield. I expect to be home by 6. It it looks like we are running late I will call. Thank you, Joe Bouchard Factory Automation Engineer and Unix Support CSC/P&W North Berwick, Maine Phone:

Re: Keeping the webserver safe

2008-10-06 Thread Joe
to is only a virtual machine, not shared with anyone else. Chroot is nowhere near enough. -- Joe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: secure installation

2007-08-17 Thread Joe
Pat wrote: I apologize if I have offended anyone with my responses. My initial post was one mentioning what I saw to be a problem in an attempt to help the community at large but some persons took offense. I don't think so. This is merely a lively discussion. A bit of philosophy which can be

Re: secure installation

2007-08-17 Thread Joe
Pat wrote: Whose responsibility is it, in the US if you manufacture a defective product legally it is your responsibility if someone is harmed. There's a bit of a difference between a defective product and one incorrectly used. When a driver knocks down a pedestrian, should the car manufac

Re: Mass update deployment strategy

2006-11-28 Thread Joe Bouchard
l see how well it works. These systems are small data collection appliances, with no proprietary data, and if one of these gets hijacked we have taken steps to prevent it from spreading, so the consequences of a vulnerability are rather small. If you have a public web server, that's a whole 'no

Re: Restricting ssh access to internet but not to internal network

2005-11-25 Thread Joe
Patrick wrote: I have an server running sshd on Sarge. I want all users to be able to access the computer from within the internal network - but restrict access from the internet (to users in a particular group). Can this be achieved by combining the /etc/hosts.allow or /etc/hosts.deny files and

Re: Server slowdown...

2004-04-11 Thread Joe Bouchard
x27;s what the sticker `made for Windows XX' means, they expect it to be rebooted frequently enough so you don't get to that point." :-) At any rate, that story bears some similarity to your situation. That's all I'll say. You might try to find out if your particular NIC has any sort of limitation like this. -- Thank you, Joe Bouchard Powered by Debian GNU/Linux

Re: Server slowdown...

2004-04-11 Thread Joe Bouchard
x27;s what the sticker `made for Windows XX' means, they expect it to be rebooted frequently enough so you don't get to that point." :-) At any rate, that story bears some similarity to your situation. That's all I'll say. You might try to find out if your particular NIC

Re: [SECURITY] [DSA 473-1] New oftpd packages fix denial of service

2004-04-05 Thread Joe Blackbird
I am not sure the CVE reference is correct for this issue. Joe On Sat, 3 Apr 2004, Matt Zimmerman wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > - -- > Debian Security

Re: [SECURITY] [DSA 473-1] New oftpd packages fix denial of service

2004-04-05 Thread Joe Blackbird
I am not sure the CVE reference is correct for this issue. Joe On Sat, 3 Apr 2004, Matt Zimmerman wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > - -- > Debian Security

Re: Why do system users have non-empty $HOME? (was Re: Why do system users have valid shells)

2003-10-27 Thread Joe Moore
d accounts." It should also be owned by root, permissions 1555. It is optional to create zero-length .rhosts, .shosts, .netrc, etc (-r root) --Joe * or something compatible with the FHS.

Re: Why do system users have non-empty $HOME? (was Re: Why do system users have valid shells)

2003-10-27 Thread Joe Moore
d accounts." It should also be owned by root, permissions 1555. It is optional to create zero-length .rhosts, .shosts, .netrc, etc (-r root) --Joe * or something compatible with the FHS. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Why do system users have non-empty $HOME? (was Re: Why do system users have valid shells)

2003-10-24 Thread Joe Moore
Russell Coker said: > On Thu, 23 Oct 2003 04:02, Joe Moore wrote: >> >> * A more important consideration is the location of "bin"'s $HOME. >> > >> > What's wrong with the current location? >> >> At the moment, nothing. Since writ

Re: Why do system users have valid shells

2003-10-24 Thread Joe Moore
Russell Coker said: > On Thu, 23 Oct 2003 04:02, Joe Moore wrote: >> > There was a case of a buggy pam some time ago which let people login >> > to >> > accounts such as "man" and "bin". Changing the shell would have >> > prevented

Re: Why do system users have valid shells

2003-10-24 Thread Joe Moore
Russell Coker said: > On Thu, 23 Oct 2003 04:02, Joe Moore wrote: >> I guess what I'm saying is that there are just as many ways to get >> access to UID2 with "bin:x:2:2:bin:/bin:/bin/false" in the >> /etc/passwd. As there are with "bin:x:2:2:bin:/bin:

Re: Why do system users have valid shells

2003-10-24 Thread Joe Moore
/etc/shadow) to determine: 1) what password is acceptable "proof" of the user's identity 2) what userid to set for the new process that is started on the user's behalf3) in what directory to start the new process that is started on the user's behalf 4) what process to start on the user's behalf. That's it. --Joe

Why do system users have non-empty $HOME? (was Re: Why do system users have valid shells)

2003-10-24 Thread Joe Moore
Russell Coker said: > On Thu, 23 Oct 2003 04:02, Joe Moore wrote: >> >> * A more important consideration is the location of "bin"'s $HOME. >> > >> > What's wrong with the current location? >> >> At the moment, nothing. Since writ

Re: Why do system users have valid shells

2003-10-24 Thread Joe Moore
Russell Coker said: > On Thu, 23 Oct 2003 04:02, Joe Moore wrote: >> > There was a case of a buggy pam some time ago which let people login >> > to >> > accounts such as "man" and "bin". Changing the shell would have >> > prevented

Re: Why do system users have valid shells

2003-10-24 Thread Joe Moore
Russell Coker said: > On Thu, 23 Oct 2003 04:02, Joe Moore wrote: >> I guess what I'm saying is that there are just as many ways to get >> access to UID2 with "bin:x:2:2:bin:/bin:/bin/false" in the >> /etc/passwd. As there are with "bin:x:2:2:bin:/bin:

Re: Why do system users have valid shells

2003-10-24 Thread Joe Moore
/etc/shadow) to determine: 1) what password is acceptable "proof" of the user's identity 2) what userid to set for the new process that is started on the user's behalf3) in what directory to start the new process that is started on the user's behalf 4) what process to start

Re: Why do system users have valid shells

2003-10-22 Thread Joe Moore
to an account, no? > And again it is a matter of "not granting priveledges where not > needed". The /etc/passwd file does not control granting of priveledges[sic]. It contains a map of UID <-> username <-> Primary GID, a comment field used by various system utilities and to set some ulimit defaults), and defaults for certain variables, such as $HOME and $SHELL. See passwd(5). --Joe

Re: Why do system users have valid shells

2003-10-22 Thread Joe Moore
Russell Coker said: > On Wed, 22 Oct 2003 20:39, Joe Moore wrote: >> Russell Coker said: >> > The idea of giving non-login accounts a shell of /bin/false is >> > hardly new. >> >> Out of curiosity, what security benefit does a shell of /bin/false >&

Re: Why do system users have valid shells

2003-10-22 Thread Joe Moore
to an account, no? > And again it is a matter of "not granting priveledges where not > needed". The /etc/passwd file does not control granting of priveledges[sic]. It contains a map of UID <-> username <-> Primary GID, a comment field used by various system utilities a

Re: Why do system users have valid shells

2003-10-22 Thread Joe Moore
Russell Coker said: > On Wed, 22 Oct 2003 20:39, Joe Moore wrote: >> Russell Coker said: >> > The idea of giving non-login accounts a shell of /bin/false is >> > hardly new. >> >> Out of curiosity, what security benefit does a shell of /bin/false >&

Re: Why do system users have valid shells

2003-10-22 Thread Joe Moore
similar to the discussion last week on "read-only" /usr mounts. Setting the shell to /bin/false does not change the security character of the system. You'd have to be root to run something as user "bin", and if you're root, you can change "bin"'s sh

Re: Why do system users have valid shells

2003-10-22 Thread Joe Moore
similar to the discussion last week on "read-only" /usr mounts. Setting the shell to /bin/false does not change the security character of the system. You'd have to be root to run something as user "bin", and if you're root, you can change "bin"'s sh

Re: Permissions Required On hosts.allow ?

2002-09-03 Thread Joe Moore
Jamie Heilman wrote: > Joe Moore wrote: >> As to your later message: >> setgroups() and initgroups() are not necessary. Already UID telnetd >> is able to write to /var/run/utmp because of its membership in GID >> utmp. > > Huh? Telnetd does not run as root.

Re: Permissions Required On hosts.allow ?

2002-08-30 Thread Joe Moore
Nick Boyce wrote: > On Thu, 29 Aug 2002 08:37:15 -0600 (MDT), Joe Moore wrote: >>Another option would be to create a group, for example called >>"tcpwrap". Add >>tcpwrap:x:150:telnetd, sshd, irc, identd >>(This list is based on the users in /etc/passwd which a

Re: Permissions Required On hosts.allow ?

2002-08-29 Thread Joe Moore
irc, identd (This list is based on the users in /etc/passwd which appear to be for services that would benefit from tcpwrap. Adjust as appropriate.) Set /etc/hosts.allow to mod 0640 and ownership root:tcpwrap When tcpd is running as UID telnetd, it will also have group equivalence to GID tcpwrap, so it will be able to read /etc/hosts.allow --Joe

Want to Make a million!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

2002-07-22 Thread Joe
Want to make a million bucks this year? Me too but it's probably not going happen! However if your looking for the opportunity to make a couple thousand a week, working form home, with your pc, we need to talk. If you're over 18 and a US resident, Just Click REPLY Send me your Name, Stat

Re: what is means ?

2002-04-19 Thread Joe Moore
one is telnetting in as root. By default in testing, in.telnetd runs as user "telnetd" (uid 103) rather than root. --Joe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: what is means ?

2002-04-19 Thread Joe Moore
one is telnetting in as root. By default in testing, in.telnetd runs as user "telnetd" (uid 103) rather than root. --Joe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Joe
ou to decide that. It's a long process, and can get very ugly. It comes down to you and what you want to do. Use this against script kiddies? It depends on what happened to your system from them, again, YOUR decision. Joe Seanor http://www.cibir.net -- To UNSUBSCRIBE, email to [EMAIL PROTE

Re: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Joe
ou to decide that. It's a long process, and can get very ugly. It comes down to you and what you want to do. Use this against script kiddies? It depends on what happened to your system from them, again, YOUR decision. Joe Seanor http://www.cibir.net -- To UNSUBSCRIBE, email to [EMAIL PROTE

Re: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Joe
suits are so much easier to handle then trying to get the Feds interested in attacks against your system. Unless, you have suffered at least $50,000 worth of damage. Just my experience, and two cents. Joe Seanor http://www.cibir.net -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subje

Re: failed ssh breakins on my exposed www box ..

2002-03-25 Thread Joe
suits are so much easier to handle then trying to get the Feds interested in attacks against your system. Unless, you have suffered at least $50,000 worth of damage. Just my experience, and two cents. Joe Seanor http://www.cibir.net -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subje

Re: Problem with IPTables

2001-12-17 Thread Joe Ellis
ate --state ESTABLISHED -j ACCEPT #iptables -A INPUT -i $IFACE -p udp -s $NAMESERVER_3 --sport 53 -m state --state ESTABLISHED -j ACCEPT # Allow UDP packets to DNS servers from client. #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_1 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_2 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_3 --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT echo "done" bash# ./test.firewall Start Rules Allow DNS servers incoming traffic...iptables: No chain/target/match by that name done -- Joe Ellis http://www.lithodyne.net

Re: Problem with IPTables

2001-12-17 Thread Joe Ellis
NPUT -i $IFACE -p udp -s $NAMESERVER_2 --sport 53 -m state > --state ESTABLISHED -j ACCEPT > #iptables -A INPUT -i $IFACE -p udp -s $NAMESERVER_3 --sport 53 -m state > --state ESTABLISHED -j ACCEPT > # Allow UDP packets to DNS servers from client. > #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_1 --dport 53 -m state > --state NEW,ESTABLISHED -j ACCEPT > #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_2 --dport 53 -m state > --state NEW,ESTABLISHED -j ACCEPT > #iptables -A OUTPUT -o $IFACE -p udp -d $NAMESERVER_3 --dport 53 -m state > --state NEW,ESTABLISHED -j ACCEPT > > echo "done" > > bash# ./test.firewall > Start Rules > Allow DNS servers incoming traffic...iptables: No chain/target/match by that > name > done > > > > > -- Joe Ellis http://www.lithodyne.net -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

time for some OpenBSD-style auditing?

2000-12-28 Thread Joe Buck
Notice that security holes fall into classes? One category of hole should be easy to eliminate from Debian by instituting a code auditing requirement. I'm referring to insecure creation of temporary files, allowing for symlink attacks. Now that we all know what this hole looks like, it should be

time for some OpenBSD-style auditing?

2000-12-28 Thread Joe Buck
Notice that security holes fall into classes? One category of hole should be easy to eliminate from Debian by instituting a code auditing requirement. I'm referring to insecure creation of temporary files, allowing for symlink attacks. Now that we all know what this hole looks like, it should b

Re: what is on port 13223

2000-10-12 Thread Joe Dollard
Port 13223 is the PowWow program. More info can be found here: http://www.robertgraham.com/pubs/firewall-seen.html Regards, Joe

Re: what is on port 13223

2000-10-11 Thread Joe Dollard
Port 13223 is the PowWow program. More info can be found here: http://www.robertgraham.com/pubs/firewall-seen.html Regards, Joe -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

dpkg and setuid programs

2000-04-27 Thread Joe
sn't been added to dpkg's code? I don't think that it would require a change in the format of .deb packages. Does anyone have any thoughts on this matter? - Joe Dollard [EMAIL PROTECTED]