rsync service on security.debian.org discontinued (use rsync.security.d.o instead)

2020-03-24 Thread Julien Cristau
t; to migrate to the new host name as soon as possible. That has now happened. security.debian.org no longer accepts connections using rsync, so for continued mirroring of the security archive you need to update your configuration to the new name. [0]: https://lists.debian.org/debian-mirrors-announce/2

discontinuing rsync service on security.debian.org

2019-11-15 Thread Julien Cristau
*not* recommend doing this.) rsync service on security.debian.org will stop in the near future (some time after the end of this month), and we encourage anyone relying on it to migrate to the new host name as soon as possible. Thanks, Julien, for the Debian mirrors team signature.asc

Re: Problems with shim and shim-signed in unstable, and proposed solutions to unblock us

2019-03-06 Thread Julien Cristau
and a >(lightly) bodged binary package [...] > > So, please - what do you think? > FWIW I also don't think 1 is reasonable, but whichever of 2 or 3 the people doing the work want to run with will be fine. Cheers, Julien

Re: [SECURITY] [DSA 3995-1] libxfont security update

2017-10-16 Thread Julien Cristau
I don't believe it does. The only relevant piece of software I'm aware of from a security point of view is Xorg, which uses libxfont2 in stretch. Julien On October 16, 2017 6:56:40 PM GMT+02:00, Adrian Bunk wrote: >On Tue, Oct 10, 2017 at 09:22:11PM +0200, Moritz Mueh

Availability of blueborne kernel fix ?

2017-09-15 Thread Julien Aubin
Hi Was just wondering : when do you plan to release kernel fix for blueborne aka cve-2017-1000251 ? Or does bluez fix mitigate the issue enough ? I have several machines with bluetooth and this security hole is quite scary. Thanks for the information !

Re: [release-notes/stretch] Release notes sign-off from the security team

2017-05-01 Thread Julien Cristau
On Mon, May 1, 2017 at 15:14:10 +0200, Florian Weimer wrote: > * Julien Cristau: > > > The current state for the release notes is actually at > > https://www.debian.org/releases/stretch/releasenotes > > It's not clear based on the architecture list in this docume

Re: [release-notes/stretch] Release notes sign-off from the security team

2017-05-01 Thread Julien Cristau
t; > <https://release.debian.org/stretch/arch_qualify.html> > The current state for the release notes is actually at https://www.debian.org/releases/stretch/releasenotes Cheers, Julien

Upcoming stable point release (8.5)

2016-05-21 Thread Julien Cristau
Hi, The next point release for "jessie" (8.5) is scheduled for Saturday, June 4th. Processing of new uploads into jessie-proposed-updates will be frozen during the preceding weekend. Cheers, Julien

Upcoming oldstable point release (7.11)

2016-05-21 Thread Julien Cristau
Hi, The next (and last) point release for "wheezy" (7.11) is scheduled for Saturday, June 4th. Processing of new uploads into wheezy-proposed-updates will be frozen during the preceding weekend. Cheers, Julien

Re: [SECURITY] [DSA 3547-1] imagemagick security update

2016-04-13 Thread Julien Cristau
a single A record. > > But that explains a lot more about how full of surprises is that black > box than I ever expected. I wonder why I don't get at least one as > well, though. The mirror it returns has it. > I'm guessing "here" means the South America zone? I've added santoro.d.o's ipv6 address to the security.debian.org rotation now, let us know if it works out. Cheers, Julien

Re: [SECURITY] [DSA 2949-1] linux security update

2014-06-05 Thread Julien Philippon
Celui-ci (et le précédent open-ssl) va falloir s'en occuper! Le 05/06/2014 14:15, Salvatore Bonaccorso a écrit : -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 - - Debian Security Advisory DSA-2949-1 secu

Re: [SECURITY] [DSA 2552-1] tiff security update

2012-09-27 Thread Julien Cristau
unstable distribution (sid), these problems have been fixed in > version 4.0.2-2. > The tiff package was renamed to tiff3 in wheezy and sid. Some information about a fixed version for that package would seem appropriate. Cheers, Julien signature.asc Description: Digital signature

Re: [SECURITY] [DSA 2189-1] chromium-browser security update

2011-03-10 Thread Julien Cristau
ther source, then you might consider making it explicit. Or removing the numbers altogether, if not. As is, it's just confusing. Cheers, Julien -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.

Re: avahi-daemon uses 100% of cpu when scanned with nmap (DoS possible?)

2011-02-24 Thread Julien Reveret
> Package: avahi-daemon > Version: 0.6.27-2 > Tags: security > Severity: critical > Justification: Introduces possible denial-of-service scenario. > > Hi, > > when I scan my server from another machine on the network using nmap, I > get this: [snip] It seems that mandriva already released an upda

Re : Lenny version info

2010-12-13 Thread Julien Patriarca
Maybe the all of that starting point was obviously out of the scope of this mailing list, but it seems to catch the interest of everyone seeing how many answers have been posted. Just stop with all that rubbish and get back to the main topic : security in Debian. - Reply message - De

Re: Hardening Debian

2010-11-23 Thread Julien Reveret
> On Tue, Nov 23, 2010 at 5:48 PM, Daniel Hood wrote: > >> Does anyone have a good checklist or script to harden a vanilla debian >> box after installation? >> > > > http://www.debian.org/doc/manuals/securing-debian-howto/ > RTFM is the law, the securing debian howto is a good start. On top of th

Re: Upcoming lenny point release

2010-08-26 Thread Julien Reveret
> > > Just give rights to opers to write in the includes dir and put a file > called '"/home/matt/ubuntized.sh.conf spaced_filename.conf" > > You know... "$i"... but that is not the issue in the post... is just > an example. > Have you ever tried to create a file containing slashes in its name ?

Re: HELP !! Can not connect as root because LDAP is broken

2009-06-19 Thread Julien
:/root:/bin/bash delete the x to obtain the following line : root::0:0:root:/root:/bin/bash now you can login with root account without password and re install your package. Julien. Le vendredi 19 juin 2009 à 14:37 +0100, Thomas Nguyen Van a écrit : > Hello, > > I de-installed by mis

Re: securing server

2008-05-07 Thread Julien Gormotte
Le Wed, 7 May 2008 13:03:03 +0200, "Jean-Paul Lacquement" <[EMAIL PROTECTED]> a écrit : > > > I already did the followings: > > > - installed chkrootkit > > > - installed fail2ban (for ssh and proftpd) > > > > Beware of DOS. > > > > > > > - allow only one user (not root) via /etc/ssh/sshd_con

RE: TR: How to verify package integrity after they have been downloaded?

2008-04-07 Thread Julien Stuby
> > Julien Stuby wrote on 2008-04-05: > > > That seems the best way. The seconde step will be to use an > > > another OS that the first to reduce even more attack surface from > > > readed disk. > > > > > > -- Julien > > > > >

RE: TR: How to verify package integrity after they have been downloaded?

2008-04-07 Thread Julien Stuby
> Julien Stuby wrote on 2008-04-05: > > That seems the best way. The seconde step will be to use an another > > OS that the first to reduce even more attack surface from readed > > disk. > > > > -- Julien > > > > Alexander Konovalenko Johannes Wie

RE: How to verify package integrity after they have been downloaded?

2008-04-06 Thread Julien Stuby
Files modified after download -> that said the system is compromise. In this case, the detection is very hard because you want signing with the compromise operating system. -- Julien On Sun, Apr 6, 2008, Bernd Eckenfels <[EMAIL PROTECTED]> wrote: > In article <[EMAIL PROTEC

TR: How to verify package integrity after they have been downloaded?

2008-04-05 Thread Julien Stuby
That seems the best way. The seconde step will be to use an another OS that the first to reduce even more attack surface from readed disk. -- Julien -Message d'origine- De : Alexander Konovalenko [mailto:[EMAIL PROTECTED] Envoyé : samedi, 5. avril 2008 22:33 À : debian-sec

RE: TR: How to verify package integrity after they have been downloaded?

2008-04-05 Thread Julien Stuby
Hotmail live connector bug again ... > Hi,> > If some packages are localy modified, This suggests that your local > system is already compromised.> :¬ > > De : Alexander Konovalenko > [mailto:[EMAIL PROTECTED] > Envoyé : samedi, 5. avril 2008 06:11> À : > debian-security@lists.debian.org> Objet

TR: How to verify package integrity after they have been downloaded?

2008-04-05 Thread Julien Stuby
-Message d'origine- De : Julien Stuby [mailto:[EMAIL PROTECTED] Envoyé : samedi, 5. avril 2008 21:19 À : 'debian-security@lists.debian.org' Objet : RE: How to verify package integrity after they have been downloaded? Hi, If some packages are localy modified, This sug

RE: How to verify package integrity after they have been downloaded?

2008-04-05 Thread Julien Stuby
Hi, If some packages are localy modified, This suggests that your local system is already compromised. :¬ De : Alexander Konovalenko [mailto:[EMAIL PROTECTED] Envoyé : samedi, 5. avril 2008 06:11 À : debian-security@lists.debian.org Objet : How to verify package integrity after they have been

Re: [SECURITY] [DSA 1086-1] New xmcd packages fix denial of service

2006-06-04 Thread Julien Danjou
On Fri, Jun 02, 2006 at 12:12:35PM +0200, Martin Schulze wrote: > For the unstable distribution (sid) this problem has been fixed in > version 2.6-18. This version does not exist. I fixed it in my NMU 2.6-17.2 (#366816). Cheers, -- Julien Danjou .''`. Debian Devel

Re: bug in tar 1.14-2.1

2006-03-24 Thread Julien Danjou
On Fri, Mar 24, 2006 at 03:53:03PM +0100, Martin Zobel-Helas wrote: > Looks like just rebuilding the security version resolves that error, for > whatever reason. Julien and me just cross checked that and got the same > result. We tried to reproduce the bug with zobel, and finally disco

unsubscribe

2002-12-13 Thread GAFNER Julien

unsubscribe

2002-12-13 Thread GAFNER Julien
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Basic question about ipchains being useful

2001-06-19 Thread Julien Dupre
gt; and you'll find out when someone cracks you through BIND and tries to mail > home. Rigth, but more generally about the interest of ipchains : if I have to consider such packets are dangerous, it means that opened service are not secured, can't I just rely on having most recent ve

Basic question about ipchains being useful

2001-06-19 Thread Julien Dupre
e wants to break in, but my current conclusion is to say that I don't need any ipchain rule. Did I miss something ? Thanks for any hint ! Julien ___ Do You Yahoo!? -- Pour faire vos courses sur le Net, Yahoo! Shopping : http://fr.shopping.yahoo.com

Re: Basic question about ipchains being useful

2001-06-19 Thread Julien Dupre
op them > and you'll find out when someone cracks you through BIND and tries to mail > home. Rigth, but more generally about the interest of ipchains : if I have to consider such packets are dangerous, it means that opened service are not secured, can't I just rely on having most recent ve

Basic question about ipchains being useful

2001-06-19 Thread Julien Dupre
e wants to break in, but my current conclusion is to say that I don't need any ipchain rule. Did I miss something ? Thanks for any hint ! Julien ___ Do You Yahoo!? -- Pour faire vos courses sur le Net, Yahoo! Shopping : http://fr.shopping.y

Re: Workstation question...

2000-11-22 Thread Julien Stern
if a security flaw is found in JS or Java (this might possibly happen), and you read your mail with something JS or Java enabled, you could run malicious code... Julien

Re: Workstation question...

2000-11-22 Thread Julien Stern
if a security flaw is found in JS or Java (this might possibly happen), and you read your mail with something JS or Java enabled, you could run malicious code... Julien -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Is Open Source software really more secure?

2000-10-08 Thread Julien Stern
insert a cryptographic trojan in an open source software. And if you look at the SSL standard, a similar trick can be done by only changing a few lines of the code. Considering the huge importance that cryptology is taking on the net nowadays, I would tend to think that this is a major point

Re: Is Open Source software really more secure?

2000-10-08 Thread Julien Stern
insert a cryptographic trojan in an open source software. And if you look at the SSL standard, a similar trick can be done by only changing a few lines of the code. Considering the huge importance that cryptology is taking on the net nowadays, I would tend to think that this is a major point

Re: On the security of e-mails

2000-05-26 Thread Julien Stern
You can use PGP, GPG or any other software. As far as I rembember, the only limit is 128 bits on _private_ keys systems, which is more than enough. I also believe there are some restrictions if you want to create and/or export a software that includes crypto, but certainly not as many restrictions than in the US, for example :) Regards, Julien