[On 04 Dec, @07:24, Paul wrote in "Re: chkrootkit and linux 2.6 ..."]
>I see this same behavior with 2.6.0-test8. Chkrookit comes up with 42
>processes possibly caused by LKM rootkit. I would have 69 processes
>running with 42 of them owned by root. When I boot back to 2.4.23, it
>
[On 04 Dec, @07:24, Paul wrote in "Re: chkrootkit and linux 2.6 ..."]
>I see this same behavior with 2.6.0-test8. Chkrookit comes up with 42
>processes possibly caused by LKM rootkit. I would have 69 processes
>running with 42 of them owned by root. When I boot back to 2.4.23, it
>
[On 02 Dec, @20:56, David wrote in "Re: chkrootkit and linux 2.6 ..."]
>
> Right now chkrootkit gets lots of false positives regarding LKMs. There
> was a pretty thorough discussion just a couple days ago so look through
> the archive for the details:
> http://lists.debian.org/debian-security/
a
[On 03 Dec, @07:28, Hideki wrote in "Re: chkrootkit and linux 2.6 ..."]
> Hi,
>
> Miek, if you are using kernel 2.6-test6 or newer, maybe not
> worry about brk() bug. this kernel vulnerability effects under
> 2.4.22 and 2.6-test5.
I know, thanks. I'm running test11 right now and I closely fo
[On 02 Dec, @20:56, David wrote in "Re: chkrootkit and linux 2.6 ..."]
>
> Right now chkrootkit gets lots of false positives regarding LKMs. There
> was a pretty thorough discussion just a couple days ago so look through
> the archive for the details:
> http://lists.debian.org/debian-security/
a
[On 03 Dec, @07:28, Hideki wrote in "Re: chkrootkit and linux 2.6 ..."]
> Hi,
>
> Miek, if you are using kernel 2.6-test6 or newer, maybe not
> worry about brk() bug. this kernel vulnerability effects under
> 2.4.22 and 2.6-test5.
I know, thanks. I'm running test11 right now and I closely fo
Hello,
When reading again about the (Debian) breakin, it said you should run chkrootkit
to see if you have a rootkit installed. Well I did. But now it is complaining
about a LKM rootkit. But i'm running a 2.6 kernel, is this still valid then?
I've checked the md5sums of some commands (ps, kill, .
Hello,
When reading again about the (Debian) breakin, it said you should run chkrootkit
to see if you have a rootkit installed. Well I did. But now it is complaining
about a LKM rootkit. But i'm running a 2.6 kernel, is this still valid then?
I've checked the md5sums of some commands (ps, kill, .
[On 04 Apr, @19:26, Steve wrote in "Re: updated sendmail package: ..."]
> I updated mine using apt-get and didn't run into a problem. Everything
> seems to be working correctly on my side.
I couldn't connect to security.debian.org. So I downloaded the packages myself
using ftp (which was still
[On 04 Apr, @18:01, Richard wrote in "8.12.3-6.2 (DSA 278-1): many r ..."]
>
> Odd, I don't get these errors on the version I built and sent to the
> security team :(
>
> If I can be of assistance in tracking this down, please let me know
6.3 works perfectly, thanks,
(What actually happened wit
[On 04 Apr, @19:26, Steve wrote in "Re: updated sendmail package: ..."]
> I updated mine using apt-get and didn't run into a problem. Everything
> seems to be working correctly on my side.
I couldn't connect to security.debian.org. So I downloaded the packages myself
using ftp (which was still
[On 04 Apr, @18:01, Richard wrote in "8.12.3-6.2 (DSA 278-1): many r ..."]
>
> Odd, I don't get these errors on the version I built and sent to the
> security team :(
>
> If I can be of assistance in tracking this down, please let me know
6.3 works perfectly, thanks,
(What actually happened wit
[On 04 Apr, @16:44, debian-sec wrote in "updated sendmail package: conf ..."]
> hello,
>
> I'm trying to install the updated sendmail packages that fix the latest
> security hole. But after the installation I get this: see below.
>
> I've installed version 8.12.6-7 from testing, which runs fine.
hello,
I'm trying to install the updated sendmail packages that fix the latest
security hole. But after the installation I get this: see below.
I've installed version 8.12.6-7 from testing, which runs fine. My system
is a your basic woody system plus some packags from testing.
To summerize:
8.12
[On 04 Apr, @16:44, debian-sec wrote in "updated sendmail package: conf ..."]
> hello,
>
> I'm trying to install the updated sendmail packages that fix the latest
> security hole. But after the installation I get this: see below.
>
> I've installed version 8.12.6-7 from testing, which runs fine.
hello,
I'm trying to install the updated sendmail packages that fix the latest
security hole. But after the installation I get this: see below.
I've installed version 8.12.6-7 from testing, which runs fine. My system
is a your basic woody system plus some packags from testing.
To summerize:
8.12
[On 13 Dec, 2001, Samuli Suonpaa wrote in " Re: Apt-get is insecure "]
> Wichert Akkerman <[EMAIL PROTECTED]> wrote:
> Umm... What exactly did you mean with your one-liner?
i looked with dselect and did a:
apt-get install debsig-verify
grtz
Miek
--
miek.nl
:wq!
[On 13 Dec, 2001, Samuli Suonpaa wrote in " Re: Apt-get is insecure "]
> Wichert Akkerman <[EMAIL PROTECTED]> wrote:
> Umm... What exactly did you mean with your one-liner?
i looked with dselect and did a:
apt-get install debsig-verify
grtz
Miek
--
miek.nl
:wq!
--
To UNSUBSCRIBE, email
[On 30 Aug, 2001, Jeff Coppock wrote in " tripwire init problem "]
> I'm trying to get tripwire installed on a new server and running
> into this issue:
>
> server_113:/usr/lib/tripwire# tripwire --init
> Please enter your local passphrase:
> Parsing policy file: /etc/tripwire/tw.pol
> ### Error:
[On 30 Aug, 2001, Jeff Coppock wrote in " tripwire init problem "]
> I'm trying to get tripwire installed on a new server and running
> into this issue:
>
> server_113:/usr/lib/tripwire# tripwire --init
> Please enter your local passphrase:
> Parsing policy file: /etc/tripwire/tw.pol
> ### Error
20 matches
Mail list logo