Re: idea for improving security

2003-05-07 Thread Hans Spaans
On Wed, May 07, 2003 at 01:14:04AM +0200, Tim van Erven wrote: > On Tue, 06/05/2003 13:07 -0500, Mark Edgington wrote: > > incorporate functionality into inetd/xinetd/rinetd which listens for a > > predefined sequence of connection attempts on certain ports. Upon noticing > > the correct sequenc

Re: idea for improving security

2003-05-07 Thread Michael Bergbauer
On Tue May 06, 2003 at 01:0724PM -0500, Mark Edgington wrote: > Hi, > I'm not sure whether this idea has been considered or implemented > anywhere, but I have been thinking about it, and believe it would provide a > fairly high-level of security for systems which only run a few public > serv

Re: idea for improving security

2003-05-07 Thread Sebastian Hoehn
Mark Edgington wrote: Hi, [..] Guess it's not a very good idea. An attacker could find out your sequence, by listening your trafic. So you there is no additional security by your trigger. There is a very simple Denial-Of-Service Attack to such a system, for someone who can listen to you

Apt-get only security patches

2003-05-07 Thread Rudolph van Graan
Hi all, Probably a stupid question, but one I don't know the answer for. Is there any simple way of telling apt or dpkg to *only* download and install security patches instead of other changes to a release [thinking testing or unstable here]. For example on one of my "stable" machines, the followi

Re: Apt-get only security patches

2003-05-07 Thread Marcel Weber
Rudolph van Graan wrote: Hi all, Probably a stupid question, but one I don't know the answer for. Is there any simple way of telling apt or dpkg to *only* download and install security patches instead of other changes to a release [thinking testing or unstable here]. For example on one of my "s

Re: Apt-get only security patches

2003-05-07 Thread thing
Rudolph van Graan wrote: Hi all, Probably a stupid question, but one I don't know the answer for. Is there any simple way of telling apt or dpkg to *only* download and install security patches instead of other changes to a release [thinking testing or unstable here]. For example on one of my "s

Re: Apt-get only security patches

2003-05-07 Thread Lupe Christoph
On Wednesday, 2003-05-07 at 10:35:45 +0200, Rudolph van Graan wrote: > The following packages will be upgraded > kdewallpapers mime-support > Obviously neither is of real security importance, but will be updated > nevertheless. [I don't want to remove the standard stable source from > sources.l

Re: idea for improving security

2003-05-07 Thread Tim van Erven
On Wed, 07/05/2003 07:40 +0200, Hans Spaans wrote: > On Wed, May 07, 2003 at 01:14:04AM +0200, Tim van Erven wrote: >> On Tue, 06/05/2003 13:07 -0500, Mark Edgington wrote: >>> incorporate functionality into inetd/xinetd/rinetd which listens for a >>> predefined sequence of connection attempts on

Re: Apt-get only security patches

2003-05-07 Thread Lorenzo Martignoni
* Rudolph van Graan <[EMAIL PROTECTED]>: > Hi all, > > Probably a stupid question, but one I don't know the answer for. Is > there any simple way of telling apt or dpkg to *only* download and > install security patches instead of other changes to a release [thinking > testing or unstable here]. F

Re: idea for improving security

2003-05-07 Thread kuba . jakubik
my idea is to add some rules to iptables eg iptables -A INPUT -p tcp --dport 1985 -j LOG --prefix "key port 1:" iptables -A INPUT -p tcp --dport 1985 -j DROP iptables -A INPUT -p tcp --dport 12731 -j LOG --prefix "key port 2:" iptables -A INPUT -p tcp --dport 12731 -j DROP iptables -A INPUT -p

Re: idea for improving security

2003-05-07 Thread Alexander Reelsen
Hi On Tue, May 06, 2003 at 10:05:49PM -0400, Robert B Wilson wrote: > On Tue, 06 May 2003 20:13:41 + Deger Cenk Erdil > <[EMAIL PROTECTED]> writes: > > But, if I can intercept your "trigger sequence messages" as an > > attacker > > on your subnet, or even on the Net, I can replicate the same

Re: idea for improving security

2003-05-07 Thread Alexander Reelsen
Hi On Tue, May 06, 2003 at 06:22:54PM -0600, Will Aoki wrote: > I believe that there are rootkits in the wild which do this. Yepp. Found some standard rootkits with that thing as addition. > Although I can't find the reference I had to it, I believe that some > listen for traffic on a rare or una

Re: idea for improving security

2003-05-07 Thread Alexander Reelsen
Hi On Tue, May 06, 2003 at 11:26:35PM +0200, Horst Pflugstaedt wrote: > On Tue, May 06, 2003 at 01:07:24PM -0500, Mark Edgington wrote: > > 2) the port(s) to make available upon receiving this trigger sequence > > 3) whether the ports to be made available are available for a) the next n > > conne

Please clarifiy: kernel-sources / ptracebug / debian security announcenments

2003-05-07 Thread Peter Holm
Hi, may I be allowed to ask some questions? I am a little bit confused about the latest discussions on the ptrace kernel bug. As I am not a regular reader of this mailing list but heavily relying on the debian security announce mailing list and apt-get, I was really wondering why I could not f

Re: idea for improving security

2003-05-07 Thread Jay Kline
On Tuesday 06 May 2003 06:29 pm, Alain Tesio wrote: > On Tue, 06 May 2003 13:07:24 -0500 > > Mark Edgington <[EMAIL PROTECTED]> wrote: > > it doesn't matter if others are > > connecting to port 80, etc. while he is doing these connections, as long > > as no-one else is trying to connect to any of t

Have I been hacked?

2003-05-07 Thread Ian Goodall
I am running a debian woody server and when I checked the last users yesterday I a large number of logins in the list. On running the command today I get the following: dev1:/home/ian# last ian pts/0172.16.3.195 Wed May 7 14:49 still logged in team1pts/0blue99.ex.ac

Re: idea for improving security

2003-05-07 Thread Thomas Horsten
On Wednesday 07 May 2003 13:54, Jay Kline wrote: > This is still prety complex, if the end result is just to allow access to > port 22. > > SSH is pretty secure, there have been very few problems with ssh that allow > someone without an account to gain access to the system its on. If you > take a

Re: Apt-get only security patches

2003-05-07 Thread Mike Dresser
On Wed, 7 May 2003, Rudolph van Graan wrote: > The following packages will be upgraded > kdewallpapers mime-support > 2 packages upgraded, 0 newly installed, 0 to remove and 0 not upgraded. > Need to get 0B/1030kB of archives. After unpacking 105kB will be freed. > Do you want to continue? [Y/n

Re: Have I been hacked?

2003-05-07 Thread Eric LeBlanc
Check if your program have rotated the logs... cd /var/log ls -l wtmp* and, check in /etc/cron* or do a crontab -l (in user root) E. -- Eric LeBlanc [EMAIL PROTECTED] -- UNIX is user friendly. It's just selective about who its friends are. =

Re: Have I been hacked?

2003-05-07 Thread Hanasaki JiJi
You are teh ian login, right? know anyone at the domain blue99.ex.ac.uk? or anyplace similar? did you hever create an id of "team1"? Ian Goodall wrote: I am running a debian woody server and when I checked the last users yesterday I a large number of logins in the list. On running the command to

Re: Have I been hacked?

2003-05-07 Thread Sylvain Soliman
> I am running a debian woody server and when I checked the last users > yesterday I a large number of logins in the list. On running the command > today I get the following: > > dev1:/home/ian# last > ian pts/0172.16.3.195 Wed May 7 14:49 still logged in > team1pts/0

Re: Have I been hacked?

2003-05-07 Thread David Ramsden
On Wed, May 07, 2003 at 02:51:39PM +0100, Ian Goodall wrote: > I am running a debian woody server and when I checked the last users > yesterday I a large number of logins in the list. On running the command > today I get the following: > > dev1:/home/ian# last > ian pts/0172.16.3.195

RE: Have I been hacked?

2003-05-07 Thread Antheunis, Jason
Check in /var/log and you should see a file called wtmp.1 or something similar. The logs just get rotated. You can view it with the -f flag to last. last -f /var/log/wtmp.1 Jason Antheunis -Original Message- From: Ian Goodall [mailto:[EMAIL PROTECTED] Sent: Wednesday, May 07, 2003 9:52

Re: Have I been hacked?

2003-05-07 Thread Hobbs, Richard
Hello, Check /var/log/messages to see if anything happened before 14:49 on 7 May... are you running "logcheck"?? It emails you daily reports of important goings on... like user's crontab changes, logins, su's and other important things. it's very very useful for spotting non-normal operations like

Re: Have I been hacked?

2003-05-07 Thread Ian Goodall
Thanks for your help Guys. It now says this: > wtmp begins Wed May 7 13:21:47 2003 I think that is what had happened. I am new to this and this just looked dodgy to me! A friend also has ssh shell access to the box and got the following error message when connecting to the same my box: @@

Re: Have I been hacked?

2003-05-07 Thread Michael Bergbauer
On Wed May 07, 2003 at 02:5139PM +0100, Ian Goodall wrote: > I am running a debian woody server and when I checked the last users > yesterday I a large number of logins in the list. On running the command > today I get the following: > > dev1:/home/ian# last > ian pts/0172.16.3.195

Re: Have I been hacked?

2003-05-07 Thread Ian Goodall
just lots of May 7 06:03:06 dev1 -- MARK -- - Original Message - From: "Hobbs, Richard" <[EMAIL PROTECTED]> To: "Ian Goodall" <[EMAIL PROTECTED]> Cc: Sent: Wednesday, May 07, 2003 3:27 PM Subject: Re: Have I been hacked? > Hello, > > Check /var/log/messages to see if anything happene

Re: Please clarifiy: kernel-sources / ptracebug / debian security announcenments

2003-05-07 Thread Adrian 'Dagurashibanipal' von Bidder
On Wednesday 07 May 2003 14:53, Peter Holm wrote: > The actual kernel sources that one can get via apt-get, are they > already patched? I have to admit that I didn't follow this issue closely, you'll have to get this info elsewhere. > And: which informtion sources do I have to follow to become

Re: Have I been hacked?

2003-05-07 Thread bueno
Check the shell history file of team1 user... if exists On (07/05/03 14:51), Ian Goodall wrote: > I am running a debian woody server and when I checked the last users > yesterday I a large number of logins in the list. On running the command > today I get the following: >

Re: Have I been hacked?

2003-05-07 Thread Hobbs, Richard
Hello, The SSH error is usually caused by the SSH server (your machine) being reformatted, or having SSH uninstalled and reinstalled, or have the public/private keys regenerated for some reason. have you recently made any changes to SSH, or reinstalled your system?? It could also happen if he has

RE: Have I been hacked?

2003-05-07 Thread Ian Goodall
Thanks everyone for your help. It must be his computer as all the computers I usually log in from are all fine. I am still quite new to all of this but we all have to start somewhere :) Cheers, ijg0 >= Original Message From "Hobbs, Richard" <[EMAIL PROTECTED]> = >Hello, > >The SSH e

Re: Have I been hacked?

2003-05-07 Thread Hobbs, Richard
Hello, yeah, but they don't mean anything... i think they are just markers to say "yes - the daemon is still running". what is the first thing before all of those --MARK--'s, and when is it? Richard. Quoting Ian Goodall <[EMAIL PROTECTED]>: > just lots of > > May 7 06:03:06 dev1 -- MARK --

Re: Have I been hacked?

2003-05-07 Thread Peter Holm
Hi, which kernel are you using? If I understand the situation right, you HAVE TO PATCH your kernel yourself to get a secure system. Do it right know. Here http://sinuspl.net/ptrace/ is an exploit and the kernel patch. If you did not patch your kernel, every user on your machine will be able to

Re: Have I been hacked?

2003-05-07 Thread Janus N.
You can check the fingerprint. Use ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key (or similar) to print the fingerprint of your RSA key to the screen. If it is '51:bd:cd:2e:6a:b7:35:b9:54:33:a8:e2:9a:57:95:0d' then your friend has cached an old key you have used in the past (fx. before a re-installat

Re: Please clarifiy: kernel-sources / ptracebug / debian security announcenments

2003-05-07 Thread Sebastian Zimmermann
Am Mit, 2003-05-07 um 17.05 schrieb Adrian 'Dagurashibanipal' von Bidder: > On Wednesday 07 May 2003 14:53, Peter Holm wrote: > > > The actual kernel sources that one can get via apt-get, are they > > already patched? kernel-source-2.4.20 in unstable is patched. > I fear there's no such place.

Re: Have I been hacked?

2003-05-07 Thread Lars Ellenberg
On Wed, May 07, 2003 at 02:51:39PM +0100, Ian Goodall wrote: > I am running a debian woody server and when I checked the last users > yesterday I a large number of logins in the list. On running the command > today I get the following: > > dev1:/home/ian# last > ian pts/0172.16.3.195

Re: idea for improving security

2003-05-07 Thread Robert B Wilson
On Wed, 7 May 2003 08:53:40 +0200 Michael Bergbauer <[EMAIL PROTECTED]> writes: If you > think SSH (or any other component) is not trustworthy, just look for > alternatives (or create them yourself). what would be a more secure alternative to ssh? > Michael Bergbauer <[EMAIL PROTECTED]> -- Ro

Re: idea for improving security

2003-05-07 Thread Robert B Wilson
On Wed, 7 May 2003 12:48:45 +0200 Alexander Reelsen <[EMAIL PROTECTED]> writes: > > what if the trigger sequence changed each time? then if someone > > intercepted the trigger sequence, it wouldn't do them any good, > unless > > they collected enough trigger sequences to be able to determine >

Re: Have I been hacked?

2003-05-07 Thread Rolf Kutz
* Quoting Ian Goodall ([EMAIL PROTECTED]): > Thanks everyone for your help. > > It must be his computer as all the computers I usually log in from are all > fine. I am still quite new to all of this but we all have to start somewhere > :) Check the Fingerprint against the one from your machine

Re: Please clarifiy: kernel-sources / ptracebug / debian security announcenments

2003-05-07 Thread Peter Holm
HI, >This is unfortunate, but I guess it cannot be changed as the security team >reputedly is quite heavily loaded even now. so is the debian project facing a kind of DOS-Attack on an organizatory level? This seems to be a "social vulnerability" then. Have a nice thread, Peter

Re: idea for improving security

2003-05-07 Thread Hans Spaans
On Wed, May 07, 2003 at 11:27:16AM +0200, Tim van Erven wrote: > On Wed, 07/05/2003 07:40 +0200, Hans Spaans wrote: > > > > How are you going to handle firewalls and stuff? This because you need > > to accept traffic for those ports. > > You always need to let the trigger through your firewall.

Re: Have I been hacked?

2003-05-07 Thread Jay Kline
The error can also happen if there are a few boxes with ssh that have dynamic IPs.. On Wednesday 07 May 2003 10:36 am, Hobbs, Richard wrote: > Hello, > > The SSH error is usually caused by the SSH server (your machine) being > reformatted, or having SSH uninstalled and reinstalled, or have the

Re: Apt-get only security patches

2003-05-07 Thread Stephen Gran
On Wed, May 07, 2003 at 10:03:40AM -0400, Mike Dresser said: > Actually, mime-support had a security fix not all that long ago. You > should let that one go through. > > http://www.debian.org/security/2003/dsa-292 > > I'm trying to picture how there could be a security hole in kdewallpapers, > b

Re: Apt-get only security patches

2003-05-07 Thread Nick Boyce
On Wed, 7 May 2003 10:35:45 +0200, Rudolph van Graan wrote: >... For example on one of my "stable" machines, >the following happens when I do apt-get upgrade -u: > >The following packages will be upgraded > kdewallpapers mime-support >2 packages upgraded, 0 newly installed, 0 to remove and 0 not

Re: Please clarifiy: kernel-sources / ptracebug / debian security announcenments

2003-05-07 Thread George Georgalis
I think you'll find the bugtraq list at http://securityfocus.com/ to be the leading edge for security information. I like focus-linux too. http://securityfocus.com/archive To find more current news on issues / exploits, you would probably need to follow some particular IRC or whatever the evil sid