Re: Reg: secure boot in debian 9 stretch

2019-03-12 Thread Matthew Crews
On 3/12/19 5:37 AM, Srinivas Rao wrote: > Hi Debian team, > > could you please tell me , secure boot is available in Debian 9 stretch > or not ? It is not.

RE: [SECURITY] [DSA 3549-1] chromium-browser security update

2016-04-15 Thread Matthew Baxa
Doesn't apply to our systems. Matthew Baxa Cloud Engineer - Zillow P 402-417-0421 M 785-213-3252 -Original Message- From: Michael Gilbert [mailto:mgilb...@debian.org] Sent: Friday, April 15, 2016 6:59 AM To: debian-security-annou...@lists.debian.org Subject: [SECURITY] [DSA 3

RE: [SECURITY] [DSA 3445-1] pygments security update

2016-01-14 Thread Matthew Baxa
Created MOPS-2468 Matthew Baxa System Administrator - Zillow P 402-417-0421 M 785-213-3252 -Original Message- From: Salvatore Bonaccorso [mailto:car...@debian.org] Sent: Wednesday, January 13, 2016 4:14 PM To: debian-security-annou...@lists.debian.org Subject: [SECURITY] [DSA 3445-1

Re: finding a process that bind a spcific port

2014-01-22 Thread Matthew Babcock
Perhaps in your haste, you missed something. If I run netstat -anpe as a user I get this specific message and the PID column is populated with only a "-" for all entries, just like you showed. I.E. netstat -anpe |grep udp (Not all processes could be identified, non-owned process info will not b

Re: debian wheezy i386 nginx iframe rootkit

2013-09-12 Thread Matthew Babcock
I am glad some one asked if the browser is running on the server; I had that thought too. The problem could be something in between the actual client and the server. Additionally, this could be done without using any "malicious software", like a rootkit. Legitimate software could be configured to c

Re: Integrity check against package repository?

2013-04-29 Thread Matthew Babcock
Hello Thank you for starting this thread!!! The command that you are referring to is (would be) a functional equivalent to Red Hat's "rpm -v all" command. Reference - I have looked into doing this in Debian and am very sad to see that there is no equivalent command in Debian, further *disappoint

Re: Why is su preserving the environment?

2009-01-24 Thread Matthew Johnson
On Sat Jan 24 14:08, Josselin Mouette wrote: > Le samedi 24 janvier 2009 à 10:05 +0000, Matthew Johnson a écrit : > > Well, if they are using DBUS this should be fine. You cannot connect to > > a session bus with a uid other than the one it is running as (including > > root

Re: Why is su preserving the environment?

2009-01-24 Thread Matthew Johnson
(I have to admit that I didn't check it myself, since I > haven't developed an application which uses gnome-keyring yet). Well, if they are using DBUS this should be fine. You cannot connect to a session bus with a uid other than the one it is running as (including root) Matt -- Matthew Johnson signature.asc Description: Digital signature

DBus plan for Lenny

2009-01-03 Thread Matthew Johnson
which should. The longer list is rdepends of libdbus-1-3, it will definitely not be anything not on this list. Opinions? Matt -- Matthew Johnson Masayuki Hatta (mhatta) cups (U) Moray Allan gpe-bluetooth (U) Michael Biebl consolekit (U) dhcdbd (U) hal (U) knetworkmanager

Re: Which hearty

2007-03-23 Thread Matthew Willso
20. And many of the shots were alley-oop dunks and rim-rattling jams postseason because of NCAA sanctions. In four seasons at Seton Hall, Amaker previous three games and take it on the road with us.'' The Suns had won 24 - Original Message - From: "Matthew Willso&

Re: Decent iptables script for bridging?

2006-05-24 Thread Matthew Palmer
On Tue, May 23, 2006 at 03:44:04PM +0200, Christian Holler wrote: > I'm currently setting up a bridge on Debian, which is meant to act as > an invisible filter in our network which is otherwise directly exposed > to the internet (every host directly reachable from the internet, no > NAT or anything

Re: [DSA 924-1] New nbd packages fix potential arbitrary code execution

2005-12-21 Thread Matthew Palmer
On Wed, Dec 21, 2005 at 03:05:01PM +0100, Martin Schulze wrote: > Kurt Fitzner discovered a buffer overflow in nbd, the network block > device client and server that could potentially allow arbitrary cod on > the NBD server. Do penguins eat cod, or just herring? Personally, I consider this a maj

Re: Critical bug in pdns - security team not responding

2005-07-10 Thread Matthew Palmer
On Sun, Jul 10, 2005 at 12:28:15AM +0200, Christoph Haas wrote: > Dear list... > > our package 'pdns' in Sarge has a serious bug which can be abused to run a > DoS attack against a name server. My co-maintainer already mailed the > security team but did not get a response yet. > > Currently we ar

Re: Bad press related to (missing) Debian security

2005-06-28 Thread Matthew Palmer
On Tue, Jun 28, 2005 at 10:36:34AM +0200, Marek Olejniczak wrote: > On Tue, 28 Jun 2005, martin f krafft wrote: > >We are working to fix it. The last thing we need now are people > >complaining and moaning. > > I'm working for many ISP providers. And now I have problems with security > on this se

Re: My machine was hacked - possibly via sshd?

2005-03-30 Thread Matthew Palmer
[MFT set to d-curiosa, as this is utterly off-topic for d-security] On Wed, Mar 30, 2005 at 09:07:01PM +1000, David Pastern wrote: > On Wed, 2005-03-30 at 20:34 +1000, Matthew Palmer wrote: > > > On Wed, Mar 30, 2005 at 07:02:55PM +1000, David Pastern wrote: > > > Redhat/Fed

Re: My machine was hacked - possibly via sshd?

2005-03-30 Thread Matthew Palmer
On Wed, Mar 30, 2005 at 07:02:55PM +1000, David Pastern wrote: > Redhat/Fedora/Suse/Mandrake are just plain silliness. However - there > is a big difference between a one year release cycle, and the fact that > it's been nearly 3 years since the release of Woody. That's a huge You're not the fir

Re: Compromised system - still ok?

2005-02-07 Thread Matthew Palmer
On Mon, Feb 07, 2005 at 07:26:43PM +0100, Milan P. Stanic wrote: > On Mon, Feb 07, 2005 at 06:25:19PM +1100, Matthew Palmer wrote: > > Obviously you've never done this. Good luck finding someone who even knows > > what TCP/IP is, let alone sufficient knowledge to be able to tr

Re: Compromised system - still ok?

2005-02-07 Thread Matthew Palmer
On Sun, Feb 06, 2005 at 11:53:50PM -0800, Alvin Oga wrote: > > On Mon, 7 Feb 2005, Matthew Palmer wrote: > > > On Sun, Feb 06, 2005 at 10:52:50PM -0800, Alvin Oga wrote: > > > it's best when you can call the fbi (on the phone) and say, they're > > &g

Re: Compromised system - still ok?

2005-02-06 Thread Matthew Palmer
On Sun, Feb 06, 2005 at 10:52:50PM -0800, Alvin Oga wrote: > it's best when you can call the fbi (on the phone) and say, they're > back, trace um "NOW" Obviously you've never done this. Good luck finding someone who even knows what TCP/IP is, let alone sufficient knowledge to be able to track a

Re: php vulnerabilities

2004-12-22 Thread Matthew Palmer
On Tue, Dec 21, 2004 at 01:28:00PM +0100, martin f krafft wrote: > Stop using PHP. Learn Zope and PostgreSQL. Because, of course, neither of those ever have security vulnerabilities, and if they did, their upstreams would naturally help us to backport security fixes to 3 year old versions of the s

Re: [DSA 597-1] New cyrus-imapd packages fix arbitrary code execution

2004-11-25 Thread Matthew Palmer
On Thu, Nov 25, 2004 at 10:34:48AM +0100, Martin Schulze wrote: > For the stable distribution (woody) these problems have been fixed in > version 1.5.19-9.2 > > For the unstable distribution (sid) these problems have been fixed in > version 2.1.17-1. Uhm, cyrus-imapd in unstable is 1.5.19-20. cy

Re: repeated requests for a file favicon.ico

2004-10-06 Thread Matthew Palmer
On Wed, Oct 06, 2004 at 12:22:47PM +0200, Jasper Filon wrote: > I agree with you that maybe it would be better if the browser would > interpret a authorisation request on a favicon.ico as a 404 (or 403) > error, but on the other hand, the request for favicon isn't any different > from a normal http

Re: repeated requests for a file favicon.ico

2004-10-06 Thread Matthew Palmer
On Wed, Oct 06, 2004 at 11:43:21AM +0200, Jasper Filon wrote: > I have a little issue with the favicon file. My www root is password > protected. But i also have a /public directory, which can be accessed by > everyone. However, when someone opens a picture in his webbrowser by > opening "www.mydom

Re: telnetd vulnerability from BUGTRAQ

2004-09-24 Thread Matthew Palmer
On Fri, Sep 24, 2004 at 11:24:54PM +0100, Dale Amon wrote: > On Fri, Sep 24, 2004 at 04:15:09PM -0600, s. keeling wrote: > > Is anyone still using telnet when there's ssh? Why? I wouldn't even > > use it inside my own firewalled LAN. ssh is just better. > > Unfortuneately if you use Cisco gear

Re: MD5 collisions found - alternative?

2004-08-25 Thread Matthew Palmer
On Wed, Aug 25, 2004 at 10:01:25AM +0100, Dale Amon wrote: > On Wed, Aug 25, 2004 at 06:02:22AM +0200, Almut Behrens wrote: > > Somewhat more seriously: are there generally any defining criteria for > > something one would call a 'hash function', saying that it always must > > map some larger input

Re: MD5 collisions found - alternative?

2004-08-25 Thread Matthew Palmer
On Wed, Aug 25, 2004 at 09:24:01AM -0400, Phillip Hofmeister wrote: > On Tue, 24 Aug 2004 at 06:18:50PM -0400, Matthew Palmer wrote: > > In the case of hashing algorithms, there's one 'key' involved -- the > > plaintext -- and for password security, you

Re: MD5 collisions found - alternative?

2004-08-24 Thread Matthew Palmer
On Tue, Aug 24, 2004 at 09:11:34PM -0400, Michael Stone wrote: > On Wed, Aug 25, 2004 at 12:39:57AM +0200, Rolf Kutz wrote: > >This depends on how the attack really works. If > >you just need to flip a few bits in a document it > >might just look like typos (think crc32). If your > >document is a t

Re: MD5 collisions found - alternative?

2004-08-24 Thread Matthew Palmer
On Wed, Aug 25, 2004 at 12:44:43AM +1000, Daniel Pittman wrote: > Also, while there are issues with those hash algorithms, I don't think > they are quite bad enough that there is a significant *immediate* risk > to my systems; the cost of breaking in through the detected collisions > is lower than

Re: MD5 collisions found - alternative?

2004-08-24 Thread Matthew Palmer
On Tue, Aug 24, 2004 at 12:20:24PM -0400, Phillip Hofmeister wrote: > On Tue, 24 Aug 2004 at 10:50:38AM -0400, Daniel Pittman wrote: > > Be aware that this sort of technique "multi-encryption" technique can > > lead to significant exposures when applied to traditional crypto; it can > > produce res

Re: rbl's status?

2004-06-14 Thread Matthew Whitworth
prefer, but this is a judgment call that sysadmins need to make based on the needs of their users. Neither choice forces poor netiquette. Matthew

Re: rbl's status?

2004-06-14 Thread Matthew Whitworth
r, but this is a judgment call that sysadmins need to make based on the needs of their users. Neither choice forces poor netiquette. Matthew -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: GnuPG can not read some pgp signatures

2004-01-07 Thread Matthew Sackman
fact that he is reporting that kmail specifically doesn't like an attached .asc does not suggest that the problem is with inline signatures. IMHO, inline signatures should not be used ever as they are liable to corruption unless the entire message + signature is encoded in quoted-printable before sending. Matthew

Re: GnuPG can not read some pgp signatures

2004-01-07 Thread Matthew Sackman
fact that he is reporting that kmail specifically doesn't like an attached .asc does not suggest that the problem is with inline signatures. IMHO, inline signatures should not be used ever as they are liable to corruption unless the entire message + signature is encoded in quoted-printabl

Re: Procmail recipe for Nitwit unsubscribers who can't read DU sigs.

2004-01-02 Thread Matthew Whitworth
a folder instead so that I can debug. Matthew Whitworth s. keeling wrote: FYI, procmail users: This appears to work fairly well so far; fwiw: # # inept mailing list (un)su[b]?scribe attempts, and "vacation" dorks. # :0 HB * 1^0 ()(I will be out o

Re: Procmail recipe for Nitwit unsubscribers who can't read DU sigs.

2004-01-02 Thread Matthew Whitworth
a folder instead so that I can debug. Matthew Whitworth s. keeling wrote: FYI, procmail users: This appears to work fairly well so far; fwiw: # # inept mailing list (un)su[b]?scribe attempts, and "vacation" dorks. # :0 HB * 1^0 ()(I will be out o

Re: apache security issue (with upstream new release)

2003-10-31 Thread Matthew Wilcox
Hey, morons, don't drop people from the CC. Otherwise they'll never know what you're saying. On Fri, Oct 31, 2003 at 03:07:26PM +0100, Lupe Christoph wrote: > Quoting Phillip Hofmeister <[EMAIL PROTECTED]>: > > > I believe your justification can be found: > > > http://bugs.debian.org/cgi-bin/b

Re: apache security issue (with upstream new release)

2003-10-31 Thread Matthew Wilcox
On Fri, Oct 31, 2003 at 09:07:57PM +0900, Hideki Yamane wrote: > I checked woody's apache source and I cannot find any patches > for mod_alias.c in apache-1.3.26/debian/patches directory. > So I guess debian's apache is effected by this vulnerability. > > Do I misunderstand this? Does apache

Re: apache security issue (with upstream new release)

2003-10-31 Thread Matthew Wilcox
Hey, morons, don't drop people from the CC. Otherwise they'll never know what you're saying. On Fri, Oct 31, 2003 at 03:07:26PM +0100, Lupe Christoph wrote: > Quoting Phillip Hofmeister <[EMAIL PROTECTED]>: > > > I believe your justification can be found: > > > http://bugs.debian.org/cgi-bin/b

Re: apache security issue (with upstream new release)

2003-10-31 Thread Matthew Wilcox
On Fri, Oct 31, 2003 at 09:07:57PM +0900, Hideki Yamane wrote: > I checked woody's apache source and I cannot find any patches > for mod_alias.c in apache-1.3.26/debian/patches directory. > So I guess debian's apache is effected by this vulnerability. > > Do I misunderstand this? Does apache

time zone whackiness with snort/postgresql...

2003-08-14 Thread Matthew Whitworth
2:57:41.457929-07 (1 row) The hardware clock is set to GMT and the OS is set to use the PST8PDT time zone. I'm using the snort-pgsql 2.0.0 and postgresql 7.3.2 packages currently in the "testing" branch. Anyone ever seen anything like this? Thanks in advance, Matthew -- T

time zone whackiness with snort/postgresql...

2003-08-08 Thread Matthew Whitworth
7 22:57:41.457929-07 (1 row) The hardware clock is set to GMT and the OS is set to use the PST8PDT time zone. I'm using the snort-pgsql 2.0.0 and postgresql 7.3.2 packages currently in the "testing" branch. Anyone ever seen anything like this? Thanks in advance, Matthew

Re: activating an unconfigured interface using /etc/network/interfaces...?

2003-07-24 Thread Matthew Whitworth
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:76747137 (73.1 MiB) TX bytes:0 (0.0 b) Interrupt:10 Base address:0x8000 ... Thanks tons! Matthew Keegan Quinn wrote: Hello Matthew, On Wed, Jul 23, 2003 at 10:34:32PM

Re: activating an unconfigured interface using /etc/network/interfaces...?

2003-07-24 Thread Matthew Whitworth
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:76747137 (73.1 MiB) TX bytes:0 (0.0 b) Interrupt:10 Base address:0x8000 ... Thanks tons! Matthew Keegan Quinn wrote: Hello Matthew, On Wed, Jul 23, 2003 at 10:34:32PM -0700

activating an unconfigured interface using /etc/network/interfaces...?

2003-07-24 Thread Matthew Whitworth
to do this using the /etc/network/interfaces file and the ifup/ifdown commands. If there is, I can't seem to get the syntax. Thanks, Matthew

activating an unconfigured interface using /etc/network/interfaces...?

2003-07-23 Thread Matthew Whitworth
to do this using the /etc/network/interfaces file and the ifup/ifdown commands. If there is, I can't seem to get the syntax. Thanks, Matthew -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Ptrace patch for 2.4.x BREAKS kill() 2 interesting effects for .pid and dot locking? (was Re: Ptrace hole / Linux 2.2.25)

2003-03-19 Thread Matthew Grant
, Matthew Grant wrote: Hi There! Sorry about making a racket, but I am posting this for the edification of all, as there is a work around without breaking your server for this one. As you can read below, I have found that the patch on 2.4.x also BREAKS kill() 2 when

Ptrace patch for 2.4.x BREAKS kill() 2 interesting effects for .pid and dot locking? (was Re: Ptrace hole / Linux 2.2.25)

2003-03-19 Thread Matthew Grant
ernel developers, please fix it properly! Thanks heaps, Matthew Grant On Thu, 2003-03-20 at 09:34, Matthew Grant wrote: Dear All, The patch also breaks kill(2) on a process with signal number 0 - This is used by a lot of monitoring programs running as one user ID to make s

Re: Ptrace patch for 2.4.x BREAKS kill() 2 interesting effects for.pid and dot locking? (was Re: Ptrace hole / Linux 2.2.25)

2003-03-19 Thread Matthew Grant
, Matthew Grant wrote: Hi There! Sorry about making a racket, but I am posting this for the edification of all, as there is a work around without breaking your server for this one. As you can read below, I have found that the patch on 2.4.x also BREAKS kill() 2 when

Ptrace patch for 2.4.x BREAKS kill() 2 interesting effects for .pidand dot locking? (was Re: Ptrace hole / Linux 2.2.25)

2003-03-19 Thread Matthew Grant
ernel developers, please fix it properly! Thanks heaps, Matthew Grant On Thu, 2003-03-20 at 09:34, Matthew Grant wrote: Dear All, The patch also breaks kill(2) on a process with signal number 0 - This is used by a lot of monitoring programs running as one user ID to make s

Re: frontpage extension and security

2003-02-13 Thread Matthew Daubenspeck
On Thu, Feb 13, 2003 at 12:02:22PM -0500, John wrote: > > Hi, > > > > Has anyone used the frontpage extension? If so, what is your opinion on > > its security? > > Is it a good thinks to install on server? > > Where can I find information about it? > > Thanks for your help? Start here http://w

Re: frontpage extension and security

2003-02-13 Thread Matthew Daubenspeck
On Thu, Feb 13, 2003 at 12:02:22PM -0500, John wrote: > > Hi, > > > > Has anyone used the frontpage extension? If so, what is your opinion on > > its security? > > Is it a good thinks to install on server? > > Where can I find information about it? > > Thanks for your help? Start here http://w

Re: Can this be considered a DoS-attack?

2003-01-08 Thread Matthew Daubenspeck
killall mozilla-bin > > to stop that (when I noticed there wad unnormal load on my box). Those are standard PHP errors, but it looks like there were a LOT of them. However, whatever the problem was on their end is fixed, because the Printer Friendly link works now. -- :wq Matthew Daubenspeck http://www.oddprocess.org

Re: Can this be considered a DoS-attack?

2003-01-08 Thread Matthew Daubenspeck
killall mozilla-bin > > to stop that (when I noticed there wad unnormal load on my box). Those are standard PHP errors, but it looks like there were a LOT of them. However, whatever the problem was on their end is fixed, because the Printer Friendly link works now. -- :wq Matthew Dau

Re: more mail stuff

2002-12-10 Thread Matthew Woodcraft
On Tue, Dec 10, 2002 at 02:21:46PM -0800, Ted Roby wrote: > I see no reason to broadcast to the world exactly what version of > exim I am running, or even that I am running exim for smtp services. > I've already modified the received_header_text variable in exim.conf > to reflect the information I

Re: more mail stuff

2002-12-10 Thread Matthew Woodcraft
On Tue, Dec 10, 2002 at 02:21:46PM -0800, Ted Roby wrote: > I see no reason to broadcast to the world exactly what version of > exim I am running, or even that I am running exim for smtp services. > I've already modified the received_header_text variable in exim.conf > to reflect the information I

[PATCH] ALERT!! - 2.2.x i386 Linux kernel has 2.4.x DoS!!!!

2002-11-19 Thread Matthew Grant
(%esp) # + andl $~(NT_MASK|TF_MASK|DF_MASK), %eax + pushl %eax + popfl movl %edx,EIP(%esp) # Now we move them to their "normal" places movl %ecx,CS(%esp) # movl %esp,%ebx Best Regards,

[PATCH] ALERT!! - 2.2.x i386 Linux kernel has DoS same as 2.4.x!!!!

2002-11-19 Thread Matthew Grant
an the follwing exploit on 2.2.x, and the machine locked completely I have not check 2.0.x, but given the staleness of this code segment, it may also be affected. The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks fairly easy to do. Best Regards, Matthew Grant PS: I am a d

[PATCH] ALERT!! - 2.2.x i386 Linux kernel has 2.4.x DoS!!!!

2002-11-19 Thread Matthew Grant
(%esp) # + andl $~(NT_MASK|TF_MASK|DF_MASK), %eax + pushl %eax + popfl movl %edx,EIP(%esp) # Now we move them to their "normal" places movl %ecx,CS(%esp) # movl %esp,%ebx Best Regards,

[PATCH] ALERT!! - 2.2.x i386 Linux kernel has DoS same as 2.4.x!!!!

2002-11-19 Thread Matthew Grant
an the follwing exploit on 2.2.x, and the machine locked completely I have not check 2.0.x, but given the staleness of this code segment, it may also be affected. The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks fairly easy to do. Best Regards, Matthew Grant PS: I am a d

[PATCH] for 2.2.x i386 Linux kernel DoS - Affects 2.2.x and probably 2.0.x

2002-11-18 Thread Matthew Grant
Hi HTere! Please find the patch for this attached. It is against linux 2.2.20. I have not tested it, but since the lcall7() code in 2.2.x is the same as for 2.4.x, it should work. It is based on Linus's and Petr's patch for 2.5.x and Alan Cox's 2.4.x Best Regards, Matthew Gr

[PATCH] for 2.2.x i386 Linux kernel DoS - Affects 2.2.x andprobably 2.0.x

2002-11-18 Thread Matthew Grant
Hi HTere! Please find the patch for this attached. It is against linux 2.2.20. I have not tested it, but since the lcall7() code in 2.2.x is the same as for 2.4.x, it should work. It is based on Linus's and Petr's patch for 2.5.x and Alan Cox's 2.4.x Best Regards, Matthew Gr

Re: FW: i386 Linux kernel DoS - Affects 2.2.x and probably 2.0.x

2002-11-17 Thread Matthew Grant
staleness of this code segment, it may also be affected. The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks fairly easy to do. Best Regards, Matthew Grant PS: I am a debian developer... Exploit code from lkml Andrea Arcangeli <[EMAIL PROTECTED]> > we just can't a

Re: FW: i386 Linux kernel DoS - Affects 2.2.x and probably 2.0.x

2002-11-17 Thread Matthew Grant
staleness of this code segment, it may also be affected. The fix appears to be to adapt the 2.4.x patch to 2.2.x, which looks fairly easy to do. Best Regards, Matthew Grant PS: I am a debian developer... Exploit code from lkml Andrea Arcangeli <[EMAIL PROTECTED]> > we just can't a

Re: Apache Log Files

2002-08-18 Thread matthew
On Sun, Aug 18, 2002 at 11:52:02AM +0200, Cristian Ionescu-Idbohrn wrote: > Matthew, > > On Wed, 14 Aug 2002, Matthew Sackman wrote: > > [snip] > > > Does anyone know of a simple program that will return info on whois IP > > lookup in a set format? > > Y

Apache Log Files

2002-08-14 Thread Matthew Sackman
ogram that will return info on whois IP lookup in a set format? Thanks, Matthew -- Matthew Sackman Nottingham England BOFH Excuse Board: Someone was smoking in the computer room and set off the halon systems.

Re: AW: dselect / apt-get and packages

2002-07-08 Thread Matthew Johnson
y would feel somewhat better with security related things, if I knew that this was done. -- Matthew Johnson. <[EMAIL PROTECTED]> "They that would give up essential liberty for temporary safety deserve neither liberty nor safety." -- Benjamin Franklin PGP Key ID: 0x5BE86FB9 http://www

Re: Proposal for new Security subsection for non-US

2002-06-28 Thread Matthew Sackman
On Mon, Jun 24, 2002 at 07:33:12AM -0400, Anthony DeRobertis wrote: > > On Sunday, June 23, 2002, at 05:21 , Matthew Sackman wrote: > > >If I've missed something obvious, please shout at me ;-) > > Only problem is that a Snort that has reached its second > birth

Re: open ssh exploit - user not getting created

2002-06-24 Thread Matthew Daubenspeck
On Mon, Jun 24, 2002 at 08:49:16PM -0400, buggz wrote: > > Does 3.3 work w/ 2.20 kernels ? > > Jun 23 10:11:38 buggz1 sshd[9598]: fatal: mmap(65536): Invalid argument > > I get that everytime I try connecting. Works on all my 2.2.20 machines... -- To UNSUBSCRIBE, email to [EMAIL PROTECTED]

Re: Proposal for new Security subsection for non-US

2002-06-23 Thread Matthew Sackman
ons, it tracks unstable. If I've missed something obvious, please shout at me ;-) So now we need a list of packages that are going to need individual definition packages and to get going. I guess we really should have another package (security-updater?) that updates sources.list with the n

Re: Proposal for new Security subsection for non-US

2002-06-22 Thread Matthew Sackman
debian packaging. Therefore I am really not looking to become a leader for this: I am very willing to work on this, but not to lead it! Matthew -- Matthew Sackman Nottingham England BOFH Excuse Board: not properly grounded, please bury computer pgpsKcyhjLAh2.pgp Description: PGP signature

Proposal for new Security subsection for non-US

2002-06-21 Thread Matthew Grant
lots of time to getting e-mail virus scanning up to snuff under Debian for this project. Hence my interest in this to help Debian puul its socks up with regard to this sort of software. Please let me know what you think. I will be following the discussion on debian-devel and debian-security. Best Re

FIX: Chunk fix for Apache 1.3.24 i386 .deb + source .dsc and .diff.gz available.

2002-06-20 Thread Matthew Grant
do NMU with new security system, or someone else can look after it. Matthew? Steve? Best Regards, Matthew Grant -- === Matthew Grant/\ ^/\^ [EMAIL PROTECTED] /\ A Linux Network Guy

PATCH: apache 1.3.24 chunk size thingy - cert_vucert944335_1.3.24

2002-06-20 Thread Matthew Grant
apache chunk size stuff for i386 on woody and sid NOW! Source .dsc and .diff is there if others want to build for other architectures. The i386 .deb works on my home system. Did not know how to do NMU with new security system, or someone else can look after it. Matthew? Steve? Best Regards, Matthew

Re: frequent mail signing => is there a GPG agent?

2002-06-09 Thread Matthew Sackman
e from all of the servers. I've no idea how true that is, or how long any such propogation would take, but I seldom ever come across gpg signed mail that mutt won't find the key for. Matthew -- Matthew Sackman Nottingham England BOFH Excuse Board: loop found in loop in redundant loopback pgpsmbaYjZ9Gh.pgp Description: PGP signature

Re: secure file transfer (again)

2002-06-07 Thread Matthew Johnson
ludes it at http://www.srcf.ucam.org/utilities/ssh/srcf-ssh.exe I've had a few problems with it, but it generally works fine -- Matthew Johnson --- Matthew 6:25-34 "Therefore I tell you, do not worry... But seek first His Kingdom and His Righteousness, and all these things w

Bug#130876: ssh: -5 discloses too much infomation to an attacker, security

2002-02-10 Thread Matthew Vernon
Wichert Akkerman writes: > Previously Matthew Vernon wrote: > > retitle 130876 Sending server software version information should be > > optional > > I'm not sure I agree with that: that easily leads to the configurable > version response option that was disc

Bug#130876: ssh: -5 discloses too much infomation to an attacker, security

2002-02-10 Thread Matthew Vernon
curityByObscurity yes' or something. Matthew -- Rapun.sel - outermost outpost of the Pick Empire http://www.pick.ucam.org

Bug#130876: ssh: -5 discloses too much infomation to an attacker, security

2002-02-10 Thread Matthew Vernon
Wichert Akkerman writes: > Previously Matthew Vernon wrote: > > retitle 130876 Sending server software version information should be optional > > I'm not sure I agree with that: that easily leads to the configurable > version response option that was discussed on ope

Bug#130876: ssh: -5 discloses too much infomation to an attacker, security

2002-02-10 Thread Matthew Vernon
curityByObscurity yes' or something. Matthew -- Rapun.sel - outermost outpost of the Pick Empire http://www.pick.ucam.org -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Secure 2.4.x kernel

2001-12-21 Thread Matthew Sackman
g a daemon and re-writing the hurd call library to take advantage of it, though no re-writing of the user space daemons would be necessary afaict. Matthew On Fri, Dec 21, 2001 at 11:23:59AM -0600, Kelly Martin wrote: > As far as I know, Linux does not support doing that. So the way you do it >

Re: Secure 2.4.x kernel

2001-12-21 Thread Matthew Sackman
g a daemon and re-writing the hurd call library to take advantage of it, though no re-writing of the user space daemons would be necessary afaict. Matthew On Fri, Dec 21, 2001 at 11:23:59AM -0600, Kelly Martin wrote: > As far as I know, Linux does not support doing that. So the way you do i

Re: Mutt & tmp files

2001-11-21 Thread Matthew Sackman
SMTP is an easy protocol to learn. just my 2p -- Matthew Sackman Nottingham, ENGLAND

Re: Mutt & tmp files

2001-11-21 Thread Matthew Sackman
SMTP is an easy protocol to learn. just my 2p -- Matthew Sackman Nottingham, ENGLAND -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: passing information via network via gpg

2001-10-04 Thread Matthew Sackman
Hi people Thanks to all who responded off list (as this is OT). I've now corrected the website so if you want to take a look at the code you will now find it at namkas.com/ncgpg/ Thanks, Matthew On Wed, Oct 03, 2001 at 10:20:24PM +0100, Matthew Sackman wrote: > Hi people, > >

Re: passing information via network via gpg

2001-10-04 Thread Matthew Sackman
Hi people Thanks to all who responded off list (as this is OT). I've now corrected the website so if you want to take a look at the code you will now find it at namkas.com/ncgpg/ Thanks, Matthew On Wed, Oct 03, 2001 at 10:20:24PM +0100, Matthew Sackman wrote: > Hi people, > >

passing information via network via gpg

2001-10-03 Thread Matthew Sackman
turn to. It works currently, and I think is fairly secure, but I'm not sure about i) the security of nc and ii) how to avoid putting the gpg passphrase in the process list when encrypting text (see the code). Hope this isn't too out of place on this list... T

passing information via network via gpg

2001-10-03 Thread Matthew Sackman
turn to. It works currently, and I think is fairly secure, but I'm not sure about i) the security of nc and ii) how to avoid putting the gpg passphrase in the process list when encrypting text (see the code). Hope this isn't too out of place on this list... T

Re: sshd attack?

2001-08-15 Thread Matthew Sackman
that they manage to steal from your system are faked, then they'll waste 2 days running a brute force cracker and will then get upset when the usernames/passwords don't work... Nice! ;-) Matthew On Wed, Aug 15, 2001 at 09:59:27AM +0200, J?rgen Persson wrote: > On Wed, Aug 15, 2001 a

Re: sshd attack?

2001-08-15 Thread Matthew Sackman
that they manage to steal from your system are faked, then they'll waste 2 days running a brute force cracker and will then get upset when the usernames/passwords don't work... Nice! ;-) Matthew On Wed, Aug 15, 2001 at 09:59:27AM +0200, J?rgen Persson wrote: > On Wed, Aug 15, 2001 a

apt and security

2001-05-29 Thread Matthew H. Ray
e were a bunch), but I was wondering if there is a dpkg -l flag of some sort that shows you the timestamps of when a package was added, and if I could get the listing of files altered by those packages once I know which ones they are? -- Matthew H. Ray [EMAIL PROTECTED] [EMAIL PROTECTED] (secure)

apt and security

2001-05-29 Thread Matthew H. Ray
(there were a bunch), but I was wondering if there is a dpkg -l flag of some sort that shows you the timestamps of when a package was added, and if I could get the listing of files altered by those packages once I know which ones they are? -- Matthew H. Ray [EMAIL PROTECTED] [EMAIL PROTECTED

Dumb question

2001-02-25 Thread Matthew Sherborne
What's chroot ?

Dumb question

2001-02-25 Thread Matthew Sherborne
What's chroot ? -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Benign crackers?

2001-02-21 Thread Matthew Sherborne
Daniel Stark wrote: > You wouldn't actually imply that hackers are out their providing a > welcome service do you? I can see if you asked for your network to > be stress tested, but to go as far as saying they provide a welcome > service? Come on! Yeah, they might have found a security w

Re: Benign crackers?

2001-02-21 Thread Matthew Sherborne
Daniel Stark wrote: You wouldn't actually imply that hackers are out their providing a welcome service do you? I can see if you asked for your network to be stress tested, but to go as far as saying they provide a welcome service? Come on! Yeah, they might have found a security whole, bu

OpenSSH and CVS

2001-02-19 Thread Matthew H. Ray
I'm running Debian on a CVS server and have Debian clients. We're using OpenSSH to replace the rsh calls in CVS. The problem is that every time a cvs user makes a CVS call (like cvs diff file), they have to enter my password. I know there's a way around this, but I can't find clear documentation

Anti Virus for Debian

2001-02-19 Thread Matthew Sherborne
Are there any gpl or similar anti-virus programs for linux ? Any reccomendations ? GBY

Re: Debian or Redhat 7???

2001-02-19 Thread Matthew Sherborne
It may get too heavy to not mirror the security update packages. Why don't we put signature verification into apt and dpkg and mirror everything ? And perhaps have a tool that checks a bunch of known mirrors for discrepencies in the keyring packages ? And have a single URL, location aware,

OpenSSH and CVS

2001-02-19 Thread Matthew H. Ray
I'm running Debian on a CVS server and have Debian clients. We're using OpenSSH to replace the rsh calls in CVS. The problem is that every time a cvs user makes a CVS call (like cvs diff file), they have to enter my password. I know there's a way around this, but I can't find clear documentatio

Anti Virus for Debian

2001-02-19 Thread Matthew Sherborne
Are there any gpl or similar anti-virus programs for linux ? Any reccomendations ? GBY -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

  1   2   >