Hi !
How are your results using the openwall kernel patch ?
www.openwall.com
Any experience ?
__
Nik Engel NETWAYS GmbH
Senior Systems Engineer Deutschherrnstr. 47a
Fon.0911/92885-13 D-90429 Nürnberg
Hi,
In March the 25th, I wrote a line about a security problem with
PHP3+postgres+apache shipped with Potato, due to character encoding. The
security team judged it wasn't a security problem, so I suppose I can
publish details about the problem.
apache 1.3.9-14
php3 3.0.18-0
Hi all!
I am trying to set up postfix (which I am new to) to use SASL
authentication. However, it seems that the postfix-tls package provided
with woody is a patch for the source code of postfix 1.1.0. Is there a
way I can get a postfix+sasl solution which is completely
.deb-dependant? I like tha
hi
i've been using openwall on a number of potato boxes w/ 2.2.20 for quite
a long time, but got no experience with the new 2.4.x version (it was
released a few days ago).
i use openwall along with hap and the pax patch (pax needs to be
modified to work with ow+hap, i did a modified patch). my ex
According to Nik Engel:
> Hi !
> How are your results using the openwall kernel patch ?
> www.openwall.com
> Any experience ?
Hi !
I've used it to compare its efficiency to other buffer overflow protections.
I would suggest you to have a look at the Grsecurity patch if you intend to
have O
Package: qpopper
Version: N/A; reported 2002-04-23
Severity: grave
Tags: security
Hello,
the new upstream version 4.04 from qpopper fixes a DoS.
Please update the package.
More infos about the problem:
http://online.securityfocus.com/bid/4295
ftp://ftp.qualcomm.com/eudora/servers/unix/popper/
Hi all.
> On Mon, 22 Apr 2002 22:35:53 +1000
> Ian Cumming <[EMAIL PROTECTED]> wrote:
> > I've come across this problem too. I think i searched freshmeat.net, and
> > found a few scripts which did the trick - however I wasn't confident
> > enough to put them into place.
> >
> > Is www a priority
hi,
Last night when I attempted to change my root password passwd bunked out on me. It
crashed and I received the following message on the console:
passwd: Critical error - immediate abort
I thought that I could still use my old root password but cannot. I attempted to boot
straight into a sh
On Mon, Apr 22, 2002 at 04:12:02PM -0600, Stefan Srdic wrote:
> Last night when I attempted to change my root password passwd bunked out on me. It
>crashed and I received the following message on the console:
>
> passwd: Critical error - immediate abort
Ooo...
> I thought that I could still us
On Apr 22, Stefan Srdic wrote:
>
> Last night when I attempted to change my root password passwd bunked out on
> me. It crashed and I received the following message on the console:
>
> passwd: Critical error - immediate abort
>
> I thought that I could still use my old root password but cannot.
Using init=/bin/sh , manually edit the /etc/shadow file. Copy the root
section from another linux box (that you know the password for) and type it
in letter by letter. That should give you a valid root password.
Andrew Tait
System Administrator
Country NetLink Pty, Ltd
E-Mail: [EMAIL PROTECTED]
W
Hi,
Simple. Do the init=/bin/sh trick. When you're booted, mount / -o
remount,rw
Then edit /etc/passwd and add this to /etc/passwd:
root2::0:0:root:/root:/bin/bash
This should do the trick :)
Hope it works!
El mar, 23-04-2002 a las 00:12, Stefan Srdic escribió:
> hi,
>
> Last night when I att
if you're using libpam-cracklib it could be related to this
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=112965&repeatmerged=yes
> hi,
> Last night when I attempted to change my root password passwd bunked out on me. It
>crashed and I received the following message on the console:
> pas
Stef,
I've noticed during the boot sequence of 2.4.18, after the ramdisk is loaded there is
a 5 second pause during which time you can get a root shell.
Do you get this opportunity? I realize it asks for a password, but it is one more
thing to try.
Other than that, using a rescue disk or the i
On Tue, 23 Apr 2002 18:56:51 -0700
Kevin <[EMAIL PROTECTED]> wrote:
> if you're using libpam-cracklib it could be related to this
>
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=112965&repeatmerged=yes
>
>
>
Thank you so much,
After reading that bug report I realized that I was using l
the last reply for that bug (quoted below) seems to have a solution, although i
haven't tried it myself. it would seem you just need to install one
of the wordlist packages (ie wenglish) and then rerun the
/etc/cron.daily/cracklib script. the wordlist should probably be a
dependency for libpam-
Hi !
How are your results using the openwall kernel patch ?
www.openwall.com
Any experience ?
__
Nik Engel NETWAYS GmbH
Senior Systems Engineer Deutschherrnstr. 47a
Fon.0911/92885-13 D-90429 Nürnberg
Hi,
In March the 25th, I wrote a line about a security problem with
PHP3+postgres+apache shipped with Potato, due to character encoding. The
security team judged it wasn't a security problem, so I suppose I can
publish details about the problem.
apache 1.3.9-14
php3 3.0.18-0p
Hi all!
I am trying to set up postfix (which I am new to) to use SASL
authentication. However, it seems that the postfix-tls package provided
with woody is a patch for the source code of postfix 1.1.0. Is there a
way I can get a postfix+sasl solution which is completely
.deb-dependant? I like that
hi
i've been using openwall on a number of potato boxes w/ 2.2.20 for quite
a long time, but got no experience with the new 2.4.x version (it was
released a few days ago).
i use openwall along with hap and the pax patch (pax needs to be
modified to work with ow+hap, i did a modified patch). my exp
According to Nik Engel:
> Hi !
> How are your results using the openwall kernel patch ?
> www.openwall.com
> Any experience ?
Hi !
I've used it to compare its efficiency to other buffer overflow protections.
I would suggest you to have a look at the Grsecurity patch if you intend to
have OW
Package: qpopper
Version: N/A; reported 2002-04-23
Severity: grave
Tags: security
Hello,
the new upstream version 4.04 from qpopper fixes a DoS.
Please update the package.
More infos about the problem:
http://online.securityfocus.com/bid/4295
ftp://ftp.qualcomm.com/eudora/servers/unix/popper/C
Hi all.
> On Mon, 22 Apr 2002 22:35:53 +1000
> Ian Cumming <[EMAIL PROTECTED]> wrote:
> > I've come across this problem too. I think i searched freshmeat.net, and
> > found a few scripts which did the trick - however I wasn't confident
> > enough to put them into place.
> >
> > Is www a priority?
hi,
Last night when I attempted to change my root password passwd bunked out on me.
It crashed and I received the following message on the console:
passwd: Critical error - immediate abort
I thought that I could still use my old root password but cannot. I attempted
to boot straight into a she
On Mon, Apr 22, 2002 at 04:12:02PM -0600, Stefan Srdic wrote:
> Last night when I attempted to change my root password passwd bunked out on
> me. It crashed and I received the following message on the console:
>
> passwd: Critical error - immediate abort
Ooo...
> I thought that I could still us
On Apr 22, Stefan Srdic wrote:
>
> Last night when I attempted to change my root password passwd bunked out on
> me. It crashed and I received the following message on the console:
>
> passwd: Critical error - immediate abort
>
> I thought that I could still use my old root password but cannot.
Using init=/bin/sh , manually edit the /etc/shadow file. Copy the root
section from another linux box (that you know the password for) and type it
in letter by letter. That should give you a valid root password.
Andrew Tait
System Administrator
Country NetLink Pty, Ltd
E-Mail: [EMAIL PROTECTED]
WW
Hi,
Simple. Do the init=/bin/sh trick. When you're booted, mount / -o
remount,rw
Then edit /etc/passwd and add this to /etc/passwd:
root2::0:0:root:/root:/bin/bash
This should do the trick :)
Hope it works!
El mar, 23-04-2002 a las 00:12, Stefan Srdic escribió:
> hi,
>
> Last night when I atte
if you're using libpam-cracklib it could be related to this
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=112965&repeatmerged=yes
> hi,
> Last night when I attempted to change my root password passwd bunked out on
> me. It crashed and I received the following message on the console:
> pas
Stef,
I've noticed during the boot sequence of 2.4.18, after the ramdisk is loaded
there is a 5 second pause during which time you can get a root shell.
Do you get this opportunity? I realize it asks for a password, but it is one
more thing to try.
Other than that, using a rescue disk or the i
On Tue, 23 Apr 2002 18:56:51 -0700
Kevin <[EMAIL PROTECTED]> wrote:
> if you're using libpam-cracklib it could be related to this
>
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=112965&repeatmerged=yes
>
>
>
Thank you so much,
After reading that bug report I realized that I was using li
the last reply for that bug (quoted below) seems to have a solution, although i
haven't tried it myself. it would seem you just need to install one
of the wordlist packages (ie wenglish) and then rerun the
/etc/cron.daily/cracklib script. the wordlist should probably be a
dependency for libpam-c
32 matches
Mail list logo