Re: Help needed - server hacked twice in three days (and I don't think I'm a newbie)

2005-07-21 Thread Thomas Sjögren
On Thu, Jul 21, 2005 at 08:17:38PM +0200, Karsten Dambekalns wrote: > Now, I find it unlikely to see the same local root exploit in 2.4.18 and > 2.6.7. They are both old kernels, compile your own and apply suitable patches. Grsecurity is one, and it doesn't need any particular configuration. >

Re: How to force users to set complex enough passwords?

2005-04-05 Thread Thomas Sjögren
On Tue, Apr 05, 2005 at 07:21:28PM +0800, xiang sen wrote: > thanks! passwdqc /Thomas -- signature.asc Description: Digital signature

Re: Grsecurity patches on Debian

2005-02-07 Thread Thomas Sjögren
On Mon, Feb 07, 2005 at 02:10:07PM +0100, Andras Got wrote: > You should start with grsec low and proc restricions set customly. > Hardening your kernel is always a option. Running grsec isn't a problem, I use on both clients and servers. Dont start with grsec low but with the custom option, CON

Re: Strange problem with mail...

2004-08-26 Thread Thomas Sjögren
On Thu, Aug 26, 2004 at 09:44:51PM +0200, Jan Luehr wrote: > Greetings, > Am Donnerstag, 26. August 2004 19:32 schrieb UnKnown: > > Hi ppl, first I wont to state that this is my first mail to this list, if > > by any chance this is not the right list to do so plz point me to the > > correct one

Re: NTP servers

2004-08-12 Thread Thomas Sjögren
On Thu, Aug 12, 2004 at 10:40:14AM -0700, Adam Morley wrote: > Hi, > > I'm interested in setting up an NTP server on a debian machine with security in > mind, but from my lookings at the official NTP server (www.ntp.org), the daemon > which serves time also updates the local clock, and hence has

binutils w PaX Vs binutils w SSP

2004-07-16 Thread Thomas Sjögren
PaX support in binutils and SSP compiled packages are two very nice things to have. The problem at this moment is that you cant have both at the same time at this moment. Using for example Steve Kemp's GCC w SSP[1], binutils comes compiled with SSP. If you then installs Petersen's binutils with

Re: Major TCP Vulnerability

2004-04-20 Thread Thomas Sjögren
On Tue, Apr 20, 2004 at 02:29:34PM -0400, Eric Dantan Rzewnicki wrote: > Has anyone heard about this? this article has no details ... appologies > for the post's data-mining ... I'm still looking for other references. > > http://www.washingtonpost.com/wp-dyn/articles/A27403-2004Apr20.html Since t

Re: Major TCP Vulnerability

2004-04-20 Thread Thomas Sjögren
On Tue, Apr 20, 2004 at 02:29:34PM -0400, Eric Dantan Rzewnicki wrote: > Has anyone heard about this? this article has no details ... appologies > for the post's data-mining ... I'm still looking for other references. > > http://www.washingtonpost.com/wp-dyn/articles/A27403-2004Apr20.html Since t

Re: Fwd: Re: [ox-en] Walther

2004-02-25 Thread Thomas Sjögren
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wed, Feb 25, 2004 at 06:02:22PM +0200, Martin Hardie wrote: > so the use of debian products for rascist work is ok for debian its a distribution of an operating system, how do you intend to stop from using it? > by using debian he associates

Re: Fwd: Re: [ox-en] Walther

2004-02-25 Thread Thomas Sjögren
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wed, Feb 25, 2004 at 06:02:22PM +0200, Martin Hardie wrote: > so the use of debian products for rascist work is ok for debian its a distribution of an operating system, how do you intend to stop from using it? > by using debian he associates

Call for testers (putting SSP in Debian)

2004-02-22 Thread Thomas Sjögren
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [Sorry for the cross-posting] Hi, with gcc-3.3 (1:3.3.3ds4-0pre4) the maintainers updated the SSP patch. It is not however applied by default. I submitted a bug report [1] about this, but the problem is that my experience with GCC w. SSP in only on t

Call for testers (putting SSP in Debian)

2004-02-22 Thread Thomas Sjögren
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [Sorry for the cross-posting] Hi, with gcc-3.3 (1:3.3.3ds4-0pre4) the maintainers updated the SSP patch. It is not however applied by default. I submitted a bug report [1] about this, but the problem is that my experience with GCC w. SSP in only on t

Re: 2.6.1 CryptoAPI woes

2004-01-20 Thread Thomas Sjögren
On Tue, Jan 20, 2004 at 08:47:40AM -0800, Johannes Graumann wrote: > Now: how do I make sure this is AES-256 and not some other permutation > of the cypher? You use the losetup -k (or --keybits) option. Eg. losetup -e aes -k 256 ... /Thomas -- == [EMAIL PROTECTED] | [EMAIL PROTECTED] == Encrypte

Re: 2.6.1 CryptoAPI woes

2004-01-20 Thread Thomas Sjögren
On Tue, Jan 20, 2004 at 08:47:40AM -0800, Johannes Graumann wrote: > Now: how do I make sure this is AES-256 and not some other permutation > of the cypher? You use the losetup -k (or --keybits) option. Eg. losetup -e aes -k 256 ... /Thomas -- == [EMAIL PROTECTED] | [EMAIL PROTECTED] == Encrypte

Re: (php?) bug exploit report

2004-01-20 Thread Thomas Sjögren
On Tue, Jan 20, 2004 at 10:00:04AM +0100, Oliver Hitz wrote: > I think you should be able to avoid such exploits by using PHP's safe > mode. It allow you, among other things, to specify that only files in > a particular directory may be executed. This way, even if someone > succeeds uploading an ex

Re: (php?) bug exploit report

2004-01-20 Thread Thomas Sjögren
On Tue, Jan 20, 2004 at 10:00:04AM +0100, Oliver Hitz wrote: > I think you should be able to avoid such exploits by using PHP's safe > mode. It allow you, among other things, to specify that only files in > a particular directory may be executed. This way, even if someone > succeeds uploading an ex

another kernel vulnerability

2004-01-05 Thread Thomas Sjögren
If you haven't heard it already: Synopsis: Linux kernel do_mremap local privilege escalation vulnerability Product: Linux kernel Version: 2.2, 2.4 and 2.6 series http://isec.pl/vulnerabilities/isec-0013-mremap.txt Patch: http://linux.bkbits.net:8080/linux-2.4/[EMAIL PROTECTED] /Thomas -- ==

another kernel vulnerability

2004-01-05 Thread Thomas Sjögren
If you haven't heard it already: Synopsis: Linux kernel do_mremap local privilege escalation vulnerability Product: Linux kernel Version: 2.2, 2.4 and 2.6 series http://isec.pl/vulnerabilities/isec-0013-mremap.txt Patch: http://linux.bkbits.net:8080/linux-2.4/[EMAIL PROTECTED] /Thomas -- ==

Re: GnuPG & mutt on Woody 3.0r2.

2003-12-22 Thread Thomas Sjögren
On Mon, Dec 22, 2003 at 12:35:49PM -0700, s. keeling wrote: > > >gpg: Signature made Sun Dec 21 17:50:12 2003 MST using DSA key ID 946886AE > > >gpg: BAD signature from "Trey Sizemore <[EMAIL PROTECTED]>" > > Now, from the same guy, same key, why do I get "Bad signature?" Is there something diffe

Re: GnuPG & mutt on Woody 3.0r2.

2003-12-22 Thread Thomas Sjögren
On Mon, Dec 22, 2003 at 12:35:49PM -0700, s. keeling wrote: > > >gpg: Signature made Sun Dec 21 17:50:12 2003 MST using DSA key ID 946886AE > > >gpg: BAD signature from "Trey Sizemore <[EMAIL PROTECTED]>" > > Now, from the same guy, same key, why do I get "Bad signature?" Is there something diffe

Re: When will kernel-image-2.4.23 be available ?

2003-12-05 Thread Thomas Sjögren
On Fri, Dec 05, 2003 at 08:08:46AM +0100, Lupe Christoph wrote: > BUT! Does anybody have a patch for the do_brk vuln on any kernel-source > package >= 2.4.20 as they are currently in the archives? I would like to > build a new kernel with the vuln patched ASAP, rather than wait for the > upload to

Re: When will kernel-image-2.4.23 be available ?

2003-12-05 Thread Thomas Sjögren
On Fri, Dec 05, 2003 at 08:08:46AM +0100, Lupe Christoph wrote: > BUT! Does anybody have a patch for the do_brk vuln on any kernel-source > package >= 2.4.20 as they are currently in the archives? I would like to > build a new kernel with the vuln patched ASAP, rather than wait for the > upload to

Re: Debian servers "hacked"?

2003-11-25 Thread Thomas Sjögren
On Fri, Nov 21, 2003 at 09:17:33AM -0500, Michael Stone wrote: > Thank you for not starting wild unfounded rumors. If you don't have the > facts it is unproductive to speculate wildly, especially in a pejorative > fashion. No starting rumours or specualting, just asking how the servers got got roo

Re: Debian servers "hacked"?

2003-11-25 Thread Thomas Sjögren
On Fri, Nov 21, 2003 at 09:17:33AM -0500, Michael Stone wrote: > Thank you for not starting wild unfounded rumors. If you don't have the > facts it is unproductive to speculate wildly, especially in a pejorative > fashion. No starting rumours or specualting, just asking how the servers got got roo

Re: Debian servers "hacked"?

2003-11-21 Thread Thomas Sjögren
On Fri, Nov 21, 2003 at 02:17:52PM +0200, Johann Spies wrote: > On Fri, Nov 21, 2003 at 12:38:50PM +0100, Thomas Sjögren wrote: > > Anyone to shed some light over this? > > There has been an announcement on the Debian-announce-list a few > minutes ago which clarifies the situat

Re: Debian servers "hacked"?

2003-11-21 Thread Thomas Sjögren
On Fri, Nov 21, 2003 at 02:17:52PM +0200, Johann Spies wrote: > On Fri, Nov 21, 2003 at 12:38:50PM +0100, Thomas Sjögren wrote: > > Anyone to shed some light over this? > > There has been an announcement on the Debian-announce-list a few > minutes ago which clarifies the situat

Re: Debian servers "hacked"?

2003-11-21 Thread Thomas Sjögren
On Fri, Nov 21, 2003 at 01:27:09PM +0100, Jan Wagner wrote: > Thats ATM unknown. It seems, that nobody (except the bad boys) has access to > the boxes. But there are ppl on the way to catch local access. Thats all I > heared. Ok, so there's no manual auditing on services, processes, etc (on a da

Re: Debian servers "hacked"?

2003-11-21 Thread Thomas Sjögren
On Fri, Nov 21, 2003 at 01:27:09PM +0100, Jan Wagner wrote: > Thats ATM unknown. It seems, that nobody (except the bad boys) has access to > the boxes. But there are ppl on the way to catch local access. Thats all I > heared. Ok, so there's no manual auditing on services, processes, etc (on a da

Re: Debian servers "hacked"?

2003-11-21 Thread Thomas Sjögren
On Fri, Nov 21, 2003 at 01:13:35PM +0100, Jan Wagner wrote: > http://luonnotar.infodrom.org/~joey/debian-announce.txt Read that a minute ago, but what happended? /Thomas -- == [EMAIL PROTECTED] | [EMAIL PROTECTED] == Encrypted e-mails preferred | GPG KeyID: 114AA85C -- signature.asc Descriptio

Re: Debian servers "hacked"?

2003-11-21 Thread Thomas Sjögren
On Fri, Nov 21, 2003 at 01:13:35PM +0100, Jan Wagner wrote: > http://luonnotar.infodrom.org/~joey/debian-announce.txt Read that a minute ago, but what happended? /Thomas -- == [EMAIL PROTECTED] | [EMAIL PROTECTED] == Encrypted e-mails preferred | GPG KeyID: 114AA85C -- signature.asc Descriptio

Debian servers "hacked"?

2003-11-21 Thread Thomas Sjögren
Anyone to shed some light over this? "Someone has cracked all the servers of the Debian Project. There has been a severe security mishap and guys should uninstall all stuff downloaded and installed in the past 2 days. Please do not apt-get anything right now! Please wait till an `official' release

Debian servers "hacked"?

2003-11-21 Thread Thomas Sjögren
Anyone to shed some light over this? "Someone has cracked all the servers of the Debian Project. There has been a severe security mishap and guys should uninstall all stuff downloaded and installed in the past 2 days. Please do not apt-get anything right now! Please wait till an `official' release

Re: Why not use /bin/noshell?

2003-10-24 Thread Thomas Sjögren
Tried the Titan noshell and it works as expected. However, Tiger complains about it if you follow the CERT installation procedure and "Register the noshell program as the valid login shell." There's no need to do this, as noshell really doesn't care and still works a non-valid shell. [...] NEW: --

Re: Why not use /bin/noshell?

2003-10-24 Thread Thomas Sjögren
Tried the Titan noshell and it works as expected. However, Tiger complains about it if you follow the CERT installation procedure and "Register the noshell program as the valid login shell." There's no need to do this, as noshell really doesn't care and still works a non-valid shell. [...] NEW: --

Re: Why do system users have valid shells

2003-10-22 Thread Thomas Sjögren
On Wed, Oct 22, 2003 at 07:41:33PM +1000, Russell Coker wrote: > We can start with "bin", "daemon", "sys", and "sync" which are the least > likely accounts to need a login shell. After those changes have been tested > to everyone's satisfaction we can then move on to others. why not deny those

Re: Why do system users have valid shells

2003-10-22 Thread Thomas Sjögren
On Wed, Oct 22, 2003 at 07:41:33PM +1000, Russell Coker wrote: > We can start with "bin", "daemon", "sys", and "sync" which are the least > likely accounts to need a login shell. After those changes have been tested > to everyone's satisfaction we can then move on to others. why not deny those

Re: ssh vulnerability in the wild

2003-09-16 Thread Thomas Sjögren
On Tue, Sep 16, 2003 at 11:59:34AM -0700, TongKe Xue wrote: > Hello, Hi, > On a slightly off topic note, I'm thinking about running an > ftp/http/ssh server for personal use in college. What precautionary > measures should I take, or rather can I take? From reading over the > various Slashdot p

Re: ssh vulnerability in the wild

2003-09-16 Thread Thomas Sjögren
On Tue, Sep 16, 2003 at 11:59:34AM -0700, TongKe Xue wrote: > Hello, Hi, > On a slightly off topic note, I'm thinking about running an > ftp/http/ssh server for personal use in college. What precautionary > measures should I take, or rather can I take? From reading over the > various Slashdot p

Re: grsecurity patch - woody

2003-08-14 Thread Thomas Sjögren
On Thu, Aug 14, 2003 at 09:57:26AM -0400, Todd Charron wrote: > I'm using the latest 2.4.18 kernel in woody (came out very recently). I was > wondering if anyone else was running into this problem and perhaps knew a way > around it? Thanks, The Debian kernel contains patches not present in th

Re: grsecurity patch - woody

2003-08-14 Thread Thomas Sjögren
On Thu, Aug 14, 2003 at 09:57:26AM -0400, Todd Charron wrote: > I'm using the latest 2.4.18 kernel in woody (came out very recently). I was > wondering if anyone else was running into this problem and perhaps knew a way > around it? Thanks, The Debian kernel contains patches not present in th

Re: Strongest linux - kernel patches

2003-07-02 Thread Thomas Sjögren
Ugly reply, but here goes... On Tue, Jul 01, 2003 at 04:27:21PM -0700, Alvin Oga wrote: > > On Tue, 1 Jul 2003, valerian wrote: > > > On Tue, Jul 01, 2003 at 02:36:37PM +0200, Javier Castillo Alcibar wrote: > > > Hi all, > > > > > > I want to setup a new linux server in internet (apache, php, p

Re: Strongest linux - kernel patches

2003-07-02 Thread Thomas Sjögren
Ugly reply, but here goes... On Tue, Jul 01, 2003 at 04:27:21PM -0700, Alvin Oga wrote: > > On Tue, 1 Jul 2003, valerian wrote: > > > On Tue, Jul 01, 2003 at 02:36:37PM +0200, Javier Castillo Alcibar wrote: > > > Hi all, > > > > > > I want to setup a new linux server in internet (apache, php, p

Re: Apache user pages (was: Re: Permissions on /root/)

2003-03-10 Thread Thomas Sjögren
On Mon, 10 Mar 2003, Johannes Berth wrote: > You don't have to make your $HOME world readable, just world executable. [...] > With 711 on your $HOME and secure chmods on your files nobody will be > able to see files you don't want them to see. ... but there's still no reason to place "public html"

Re: Apache user pages (was: Re: Permissions on /root/)

2003-03-10 Thread Thomas Sjögren
On Mon, 10 Mar 2003, Johannes Berth wrote: > You don't have to make your $HOME world readable, just world executable. [...] > With 711 on your $HOME and secure chmods on your files nobody will be > able to see files you don't want them to see. ... but there's still no reason to place "public html"

Re: Apache user pages (was: Re: Permissions on /root/)

2003-03-10 Thread Thomas Sjögren
On Monday 10 March 2003 15.19, Rob VanFleet wrote: > > No they don't. > > You shouldn't place user websites in their home dirs. Place the > > user "webspace" in e.g /var/www/[user] and symlink from > > public_html or whatever. > > ..and this makes a difference how...? I'm not necessarily trying t

Re: Apache user pages (was: Re: Permissions on /root/)

2003-03-10 Thread Thomas Sjögren
On Monday 10 March 2003 15.19, Rob VanFleet wrote: > > No they don't. > > You shouldn't place user websites in their home dirs. Place the > > user "webspace" in e.g /var/www/[user] and symlink from > > public_html or whatever. > > ..and this makes a difference how...? I'm not necessarily trying t

Re: Permissions on /root/

2003-03-08 Thread Thomas Sjögren
On Sat, 8 Mar 2003, Birzan George Cristian wrote: > > It should be locked down and not touched by adduser ("Would You Like To > > Make All Homedirs World-Readable?"). > root is not the regular user. Users need o+x on their home dirs for > Apache to be able to serve pages. No they don't. You shoul

Re: Permissions on /root/

2003-03-08 Thread Thomas Sjögren
On Sat, 8 Mar 2003, Birzan George Cristian wrote: > > It should be locked down and not touched by adduser ("Would You Like To > > Make All Homedirs World-Readable?"). > root is not the regular user. Users need o+x on their home dirs for > Apache to be able to serve pages. No they don't. You shoul