tephan
> Mario Ohnewald wrote:
> > Hi Horst
> >
> > On Sun, 2006-02-26 at 22:23 +0100, Horst Pflugstaedt wrote:
> >
> >> On Sun, Feb 26, 2006 at 10:11:44PM +0100, Mario Ohnewald wrote:
> >>
> >>> Hello security list!
> >
Hi Horst
On Sun, 2006-02-26 at 22:23 +0100, Horst Pflugstaedt wrote:
> On Sun, Feb 26, 2006 at 10:11:44PM +0100, Mario Ohnewald wrote:
> > Hello security list!
> >
> > I would like to secure the harddrive/partitions of linux box.
> >
> > The whole setup must f
Hello security list!
I would like to secure the harddrive/partitions of linux box.
The whole setup must fulfill the following requirements:
a) it must be able to boot (remotely) without userinput/passphrase
b) the importtant partitions such as /etc, /var, /usr and /home must be
encrypted/protect
On Saturday 17 April 2004 01:33, Bernd Eckenfels wrote:
> In article <[EMAIL PROTECTED]> you wrote:
> > -rwsr-xr-x1 root root22460 Oct 1 2001 /usr/bin/crontab
> >
> > yes, because only in this condition normal user can set crontab rules.
>
> this deends on the cron used. The cron
On Saturday 17 April 2004 01:33, Bernd Eckenfels wrote:
> In article <[EMAIL PROTECTED]> you wrote:
> > -rwsr-xr-x1 root root22460 Oct 1 2001 /usr/bin/crontab
> >
> > yes, because only in this condition normal user can set crontab rules.
>
> this deends on the cron used. The cron
Hello!
Everybody knows that files with a suid bit set can be dangerous.
Well, i was asking myself today why exactly linux uses the suid bit files?!
Could someone please explain that to me?
Example:
~$ ls -lah /var/spool/cron/crontabs/user
-rw---1 root user 408 Apr 16
Ok, th
Hello!
Everybody knows that files with a suid bit set can be dangerous.
Well, i was asking myself today why exactly linux uses the suid bit files?!
Could someone please explain that to me?
Example:
~$ ls -lah /var/spool/cron/crontabs/user
-rw---1 root user 408 Apr 16
Ok, th
Hello list!
This is a part of my tripwire config file:
#
# Critical System Boot Files
# These files are critical to a correct system boot.
#
(
rulename = "Critical system boot files",
emailto = [EMAIL PROTECTED], severity = $(SIG_HI)
)
{
/boot -> $(SEC_CRIT) ;
Hello list!
This is a part of my tripwire config file:
#
# Critical System Boot Files
# These files are critical to a correct system boot.
#
(
rulename = "Critical system boot files",
emailto = [EMAIL PROTECTED], severity = $(SIG_HI)
)
{
/boot -> $(SEC_CRIT) ;
Hello!
Is there a bsign howto out there or any more info than the manpage?
The problem i am stuck with at the moment is:
bsign --sign -i / -e /proc -I -s --P "--homedir keydir"
Enter pass phrase:
bsign: incorrect passphrase or gpg not installed
I never set a passphrase i think. Anyway, a dpkg
Hello!
Is there a bsign howto out there or any more info than the manpage?
The problem i am stuck with at the moment is:
bsign --sign -i / -e /proc -I -s --P "--homedir keydir"
Enter pass phrase:
bsign: incorrect passphrase or gpg not installed
I never set a passphrase i think. Anyway, a dpkg
Hello!
> -Original Message-
> From: Jens Gutzeit [mailto:[EMAIL PROTECTED]
> Sent: 02 September 2003 18:44
> To: debian-security@lists.debian.org
> Subject: Re: execute application from webinterface
>
>
> On Tuesday 02 September 2003 19:25, Jens Gutzeit wrote:
>
> > > what's wrong with mak
Hello!
> -Original Message-
> From: Jens Gutzeit [mailto:[EMAIL PROTECTED]
> Sent: 02 September 2003 18:44
> To: [EMAIL PROTECTED]
> Subject: Re: execute application from webinterface
>
>
> On Tuesday 02 September 2003 19:25, Jens Gutzeit wrote:
>
> > > what's wrong with making the program
Hello List!
What is the securest way of starting a application, like ping, from a
webinterface as a diffrent user.
Lets say, to run ping 123.456.789.000 as user user123.
If i use "system", it executes it as www-data.
Any idea how i could solve this problem?
With php, perl, bash, etc... ?
Thank y
Hello List!
What is the securest way of starting a application, like ping, from a
webinterface as a diffrent user.
Lets say, to run ping 123.456.789.000 as user user123.
If i use "system", it executes it as www-data.
Any idea how i could solve this problem?
With php, perl, bash, etc... ?
Thank y
> and in english?
He will properly drive up with the bike. Can you bring the battery changer
for the mobile with you
onto the mountain.
--
Wrong address i guess :D
>
> On Tue, 29 Jul 2003, Andreas Zeitz-Fehse wrote:
>
> > Hi,
> >
> >
> > ich werd wohl heute mit dem Fahrad hochfahren. Kanns
> and in english?
He will properly drive up with the bike. Can you bring the battery changer
for the mobile with you
onto the mountain.
--
Wrong address i guess :D
>
> On Tue, 29 Jul 2003, Andreas Zeitz-Fehse wrote:
>
> > Hi,
> >
> >
> > ich werd wohl heute mit dem Fahrad hochfahren. Kanns
Hello!
>-Original Message-
>From: Anne Carasik [mailto:[EMAIL PROTECTED]
>Sent: Monday, July 07, 2003 5:05 PM
>To: [EMAIL PROTECTED]
>Cc: debian-security@lists.debian.org
>Subject: Re: configure ssh-access
>
>
>Why not just limit the access through SSH public key?
>It sounds like that woul
Hello!
>-Original Message-
>From: Anne Carasik [mailto:[EMAIL PROTECTED]
>Sent: Monday, July 07, 2003 5:05 PM
>To: [EMAIL PROTECTED]
>Cc: [EMAIL PROTECTED]
>Subject: Re: configure ssh-access
>
>
>Why not just limit the access through SSH public key?
>It sounds like that would accomplish wh
Hi,
>-Original Message-
>From: Vincent Hanquez [mailto:[EMAIL PROTECTED]
>Sent: Monday, June 16, 2003 10:46 AM
>To: Mario Ohnewald
>Cc: debian-security@lists.debian.org
>Subject: Re: chroot, su and sudo
>
>
>On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohn
Hello!
I want to chroot a application/gameserver.
What is the better/securest way?
1.) "Chroot /path" and then do a "su -s /bin/sh user -c start.sh"
or
2.) "su -s /bin/sh user" and then do the "chroot /path" as normal user and
execute the "start.sh" in the chroot?
Solution 2 does not need a root
Hi,
>-Original Message-
>From: Vincent Hanquez [mailto:[EMAIL PROTECTED]
>Sent: Monday, June 16, 2003 10:46 AM
>To: Mario Ohnewald
>Cc: [EMAIL PROTECTED]
>Subject: Re: chroot, su and sudo
>
>
>On Mon, Jun 16, 2003 at 10:22:49AM +0200, Mario Ohnewald wrote:
>
Hello!
I want to chroot a application/gameserver.
What is the better/securest way?
1.) "Chroot /path" and then do a "su -s /bin/sh user -c start.sh"
or
2.) "su -s /bin/sh user" and then do the "chroot /path" as normal user and
execute the "start.sh" in the chroot?
Solution 2 does not need a root
23 matches
Mail list logo