Hi
How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default
kernel for woody.
What is state of that kernel?
Regards
-- Riku
- Original Message -
From: "peace bwitchu" <[EMAIL PROTECTED]>
To: "John Keimel" <[EMAIL PROTECTED]>;
Sent: Tuesday, December 02, 2003 1:40 PM
on Wed, Dec 03, 2003 at 12:14:10AM +0100, Marcel Weber ([EMAIL PROTECTED])
wrote:
> Michael Stone wrote:
> Actually this is exactly what I meant: There are known risks and
> unknown risks. What we can avoid are in the first place the known
> risks. So the question is just if we want to take these
Quoting Riku Valli ([EMAIL PROTECTED]):
> How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default
> kernel for woody.
Default _installation_ kernel. My understanding is that it's expected
you'd apt-get install an image suitable to your hardware at the end of
installation.
-
Rick Moen wrote:
Quoting Riku Valli ([EMAIL PROTECTED]):
How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default
kernel for woody.
Default _installation_ kernel. My understanding is that it's expected
you'd apt-get install an image suitable to your hardware at the end
On Tue, 2 Dec 2003, Jan H. van Gils wrote:
> After some research a found that kernel-image-2.4.18 is patched
> regarding the security problem with the kernel.
>
> I am wonder when kernel 2.4.23 wil be available as a packages for sarge ?
Nobody knows for sure, but the things which should happen, i
Quoting Tim Nicholas ([EMAIL PROTECTED]):
> That may be expected, but I would bet good money that it's not actually
> the case.
Not the case that people are intended to pick a hardware-suitable image
to replace the installation kernel, or not the case that people do?
Please note that I never _
Hi
At my computers this normal stock kernel is enough... So i am too lazy to
compile kernel. I do it only if hardware or something need it and often i
used only kernel-headers for that job. i only used Linux to different jobs
and only goals are it work, it is safe and it is easy maintain.
One poin
Quoting Riku Valli ([EMAIL PROTECTED]):
> At my computers this normal stock kernel is enough... So i am too lazy to
> compile kernel.
I hope you're aware of the third alternative: precompiled images that
are appropriate to your architecture and designed (unlike the
installation kernel) for long-
On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote:
> This is reason why i ask what about stock kernels, because i belive i am not
> lonely cowboy at the middle of the no where. Debian is distrubution and
Probably not... it is just that amongst a security conscious
group you are likely to
on Wed, Dec 03, 2003 at 01:31:29PM +, Dale Amon ([EMAIL PROTECTED]) wrote:
> On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote:
> > This is reason why i ask what about stock kernels, because i belive i am not
> > lonely cowboy at the middle of the no where. Debian is distrubution and
>
On Wed, Dec 03, 2003 at 06:46:51AM -0800, Karsten M. Self wrote:
> Having a team that shares experience and combines talents in patching a
> kernel and tuning it to secure configurations is a preferable approach.
> While you _might_ do well on your own, the typical admin doesn't have
> these skills
Well the thing about Debian kernel source is they
incorporate more than just security patches into their
source. For example if you download red hat source
you get many performance patches etc. as well as any
security patches that are available. To find all
these
patches and apply does take some
Hi,
Miek, if you are using kernel 2.6-test6 or newer, maybe not
worry about brk() bug. this kernel vulnerability effects under
2.4.22 and 2.6-test5.
in DSA-403,
>This bug has been fixed in kernel version 2.4.23 for the 2.4 tree and
>2.6.0-test6 kernel tree. For Debian it has been fixed in v
Also,
You may wish to look at the make-kpkg(kernel-package) package. It
takes your stock 2.4.23 source and makes it into a nice .deb file for
you.
Note: This option is for those who have a working .config file.
Experience in making your own config make (config|menuconfig|xconfig) is
recommended.
At 21:26 03.12.2003 +0100, you wrote:
> Experience in making your own config make (config|menuconfig|xconfig) is
> recommended.
No experience without the first try. Take about two days for reading the
documentation and finding the brands on the chips your machine works with.
P.S.: Before reboo
I'm one of those people. How do I figure out what kernel image to (AMD
k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred
processor? How do I find out whether it supports ReiserFS, ...?
Thanks for any hint to the novice.
Joh
On Wed, 3 Dec 2003 02:00:19 -0800
Rick Moen <[EMAIL PR
Hi!
I, like many others, don't know where ziyi's key was installed and with
which permisions, so... don't know if it was compromised or one can still
trust this key and the signatures made with it to assure that the packages
we are getting are the ones we should be getting.
Can somebody with the
Quoting Adam ENDRODI ([EMAIL PROTECTED]):
> PS: Apologies for the ranting I sent at the beginning of the other
> thread. I, too, didn't realize that no-one had known about the
> possible impacts of the kernel bug.
Well, _one_ guy did. ;->
--
Cheers, * Contributing
[On 02 Dec, @20:56, David wrote in "Re: chkrootkit and linux 2.6 ..."]
>
> Right now chkrootkit gets lots of false positives regarding LKMs. There
> was a pretty thorough discussion just a couple days ago so look through
> the archive for the details:
> http://lists.debian.org/debian-security/
a
On Wed, Dec 03, 2003 at 10:43:44PM +0100, Marc F. Neininger wrote:
> No experience without the first try. Take about two days for reading the
> documentation and finding the brands on the chips your machine works with.
Nah, just look at /proc/cpuinfo, /proc/pci (or use lspci), dmesg, etc
It's alm
On Wed, Dec 03, 2003 at 10:05:10AM +0100, Miek Gieben wrote:
> I more and more start to think this is a bug in chkrootkit - on
> busier systems more processes are hidded than on quiet systems.
Sounds to me as a race condition: number of processes changes between
the two checks.
Indeed, in chkproc
[On 03 Dec, @07:28, Hideki wrote in "Re: chkrootkit and linux 2.6 ..."]
> Hi,
>
> Miek, if you are using kernel 2.6-test6 or newer, maybe not
> worry about brk() bug. this kernel vulnerability effects under
> 2.4.22 and 2.6-test5.
I know, thanks. I'm running test11 right now and I closely fo
Thomas Wana, 2003-12-03 00:00:18 +0100 :
> Now that all machines out there are fixed and save of this
> particular exploit :-)
Hah. You bet.
> can anyone of you describe *exactly* what this exploit does? I've
> been looking at the code (mm/mm.c, around line 1045) for some time
> now and I can'
On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote:
> I'm one of those people. How do I figure out what kernel image to (AMD
> k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred
> processor? How do I find out whether it supports ReiserFS, ...?
> Thanks for any hint to the novice
On Wednesday 03 December 2003 20:57, Phillip Hofmeister wrote:
> You may wish to look at the make-kpkg(kernel-package) package. It
> takes your stock 2.4.23 source and makes it into a nice .deb file for
> you.
>
> Note: This option is for those who have a working .config file.
> Experience in maki
On Wed, Dec 03, 2003 at 06:46:51AM -0800, Karsten M. Self wrote:
> on Wed, Dec 03, 2003 at 01:31:29PM +, Dale Amon ([EMAIL PROTECTED]) wrote:
> > On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote:
> > > This is reason why i ask what about stock kernels, because i belive i am
> > > not
Thanks,
Joh
On Wed, 03 Dec 2003 14:35:51 -0800
Kourosh <[EMAIL PROTECTED]> wrote:
> On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote:
> > I'm one of those people. How do I figure out what kernel image to
> > (AMD k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP
> > Thoroughbred proces
... but on a second thought: how do I find this information out ion my
own and what does "SMP" stand for?
Joh
On Wed, 03 Dec 2003 14:35:51 -0800
Kourosh <[EMAIL PROTECTED]> wrote:
> On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote:
> > I'm one of those people. How do I figure out what kernel
> ... but on a second thought: how do I find this information out ion my
> own and what does "SMP" stand for?
Not sure about your first question -- but SMP = Symettric Multi-Processor
(e.g. more than 1 CPU in 1 motherboard/mothercard)...
> Joh
[EMAIL PROTECTED]
In article <[EMAIL PROTECTED]> you wrote:
> Nah, just look at /proc/cpuinfo, /proc/pci (or use lspci), dmesg, etc
> It's almost all there for you. Not like the old days...
lshw is fine for collecting the above information. If you need more
detection try discover (Progeny) or Kudzu (Redhat) both av
> ... but on a second thought: how do I find this information out ion my
> own and what does "SMP" stand for?
my understanding is that all of the post-k6/III CPUs from AMD are K7-ish.
[well, the 32-bit non-AMD64 cpus anyway... if there are other quirks *I*
would like to know.] you'd know if you h
I just wanted to take the opportunity to thank everyone in the Debian
community for their hard work on the cleanup and forensic analysis of the
recent system compromise.
As a security engineer, I would like to say that this compromise was the
cleanest, most professionally handled that I have encou
Hi
How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default
kernel for woody.
What is state of that kernel?
Regards
-- Riku
- Original Message -
From: "peace bwitchu" <[EMAIL PROTECTED]>
To: "John Keimel" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Tuesday, Decembe
on Wed, Dec 03, 2003 at 12:14:10AM +0100, Marcel Weber ([EMAIL PROTECTED]) wrote:
> Michael Stone wrote:
> Actually this is exactly what I meant: There are known risks and
> unknown risks. What we can avoid are in the first place the known
> risks. So the question is just if we want to take these
Quoting Riku Valli ([EMAIL PROTECTED]):
> How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default
> kernel for woody.
Default _installation_ kernel. My understanding is that it's expected
you'd apt-get install an image suitable to your hardware at the end of
installation.
-
Rick Moen wrote:
Quoting Riku Valli ([EMAIL PROTECTED]):
How about boot floppies kernel? Kernel-image-2.4.18-bf2.4 which is default
kernel for woody.
Default _installation_ kernel. My understanding is that it's expected
you'd apt-get install an image suitable to your hardware at the end of
i
On Tue, 2 Dec 2003, Jan H. van Gils wrote:
> After some research a found that kernel-image-2.4.18 is patched
> regarding the security problem with the kernel.
>
> I am wonder when kernel 2.4.23 wil be available as a packages for sarge ?
Nobody knows for sure, but the things which should happen, i
Quoting Tim Nicholas ([EMAIL PROTECTED]):
> That may be expected, but I would bet good money that it's not actually
> the case.
Not the case that people are intended to pick a hardware-suitable image
to replace the installation kernel, or not the case that people do?
Please note that I never _
Hi
At my computers this normal stock kernel is enough... So i am too lazy to
compile kernel. I do it only if hardware or something need it and often i
used only kernel-headers for that job. i only used Linux to different jobs
and only goals are it work, it is safe and it is easy maintain.
One poin
Quoting Riku Valli ([EMAIL PROTECTED]):
> At my computers this normal stock kernel is enough... So i am too lazy to
> compile kernel.
I hope you're aware of the third alternative: precompiled images that
are appropriate to your architecture and designed (unlike the
installation kernel) for long-
On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote:
> This is reason why i ask what about stock kernels, because i belive i am not
> lonely cowboy at the middle of the no where. Debian is distrubution and
Probably not... it is just that amongst a security conscious
group you are likely to
on Wed, Dec 03, 2003 at 01:31:29PM +, Dale Amon ([EMAIL PROTECTED]) wrote:
> On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote:
> > This is reason why i ask what about stock kernels, because i belive i am not
> > lonely cowboy at the middle of the no where. Debian is distrubution and
>
On Wed, Dec 03, 2003 at 06:46:51AM -0800, Karsten M. Self wrote:
> Having a team that shares experience and combines talents in patching a
> kernel and tuning it to secure configurations is a preferable approach.
> While you _might_ do well on your own, the typical admin doesn't have
> these skills
Well the thing about Debian kernel source is they
incorporate more than just security patches into their
source. For example if you download red hat source
you get many performance patches etc. as well as any
security patches that are available. To find all
these
patches and apply does take some
[On 03 Dec, @07:28, Hideki wrote in "Re: chkrootkit and linux 2.6 ..."]
> Hi,
>
> Miek, if you are using kernel 2.6-test6 or newer, maybe not
> worry about brk() bug. this kernel vulnerability effects under
> 2.4.22 and 2.6-test5.
I know, thanks. I'm running test11 right now and I closely fo
On Wed, Dec 03, 2003 at 10:05:10AM +0100, Miek Gieben wrote:
> I more and more start to think this is a bug in chkrootkit - on
> busier systems more processes are hidded than on quiet systems.
Sounds to me as a race condition: number of processes changes between
the two checks.
Indeed, in chkproc
[On 02 Dec, @20:56, David wrote in "Re: chkrootkit and linux 2.6 ..."]
>
> Right now chkrootkit gets lots of false positives regarding LKMs. There
> was a pretty thorough discussion just a couple days ago so look through
> the archive for the details:
> http://lists.debian.org/debian-security/
a
Also,
You may wish to look at the make-kpkg(kernel-package) package. It
takes your stock 2.4.23 source and makes it into a nice .deb file for
you.
Note: This option is for those who have a working .config file.
Experience in making your own config make (config|menuconfig|xconfig) is
recommended.
On Wednesday 03 December 2003 20:57, Phillip Hofmeister wrote:
> You may wish to look at the make-kpkg(kernel-package) package. It
> takes your stock 2.4.23 source and makes it into a nice .deb file for
> you.
>
> Note: This option is for those who have a working .config file.
> Experience in maki
Hi!
I, like many others, don't know where ziyi's key was installed and with
which permisions, so... don't know if it was compromised or one can still
trust this key and the signatures made with it to assure that the packages
we are getting are the ones we should be getting.
Can somebody with the
On Wed, Dec 03, 2003 at 06:46:51AM -0800, Karsten M. Self wrote:
> on Wed, Dec 03, 2003 at 01:31:29PM +, Dale Amon ([EMAIL PROTECTED]) wrote:
> > On Wed, Dec 03, 2003 at 03:21:57PM +0200, Riku Valli wrote:
> > > This is reason why i ask what about stock kernels, because i belive i am not
> > >
At 21:26 03.12.2003 +0100, you wrote:
> Experience in making your own config make (config|menuconfig|xconfig) is
> recommended.
No experience without the first try. Take about two days for reading the
documentation and finding the brands on the chips your machine works with.
P.S.: Before rebootin
Quoting Adam ENDRODI ([EMAIL PROTECTED]):
> PS: Apologies for the ranting I sent at the beginning of the other
> thread. I, too, didn't realize that no-one had known about the
> possible impacts of the kernel bug.
Well, _one_ guy did. ;->
--
Cheers, * Contributing
I'm one of those people. How do I figure out what kernel image to (AMD
k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred
processor? How do I find out whether it supports ReiserFS, ...?
Thanks for any hint to the novice.
Joh
On Wed, 3 Dec 2003 02:00:19 -0800
Rick Moen <[EMAIL PR
On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote:
> I'm one of those people. How do I figure out what kernel image to (AMD
> k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP Thoroughbred
> processor? How do I find out whether it supports ReiserFS, ...?
> Thanks for any hint to the novice
On Wed, Dec 03, 2003 at 10:43:44PM +0100, Marc F. Neininger wrote:
> No experience without the first try. Take about two days for reading the
> documentation and finding the brands on the chips your machine works with.
Nah, just look at /proc/cpuinfo, /proc/pci (or use lspci), dmesg, etc
It's alm
Thomas Wana, 2003-12-03 00:00:18 +0100 :
> Now that all machines out there are fixed and save of this
> particular exploit :-)
Hah. You bet.
> can anyone of you describe *exactly* what this exploit does? I've
> been looking at the code (mm/mm.c, around line 1045) for some time
> now and I can'
Thanks,
Joh
On Wed, 03 Dec 2003 14:35:51 -0800
Kourosh <[EMAIL PROTECTED]> wrote:
> On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote:
> > I'm one of those people. How do I figure out what kernel image to
> > (AMD k6/K6 II/K6 III, AMD K7, AMD k7 SMP) for a AMD 1800+ XP
> > Thoroughbred proces
... but on a second thought: how do I find this information out ion my
own and what does "SMP" stand for?
Joh
On Wed, 03 Dec 2003 14:35:51 -0800
Kourosh <[EMAIL PROTECTED]> wrote:
> On Wed, 2003-12-03 at 09:54, Johannes Graumann wrote:
> > I'm one of those people. How do I figure out what kernel
> ... but on a second thought: how do I find this information out ion my
> own and what does "SMP" stand for?
Not sure about your first question -- but SMP = Symettric Multi-Processor
(e.g. more than 1 CPU in 1 motherboard/mothercard)...
> Joh
[EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMA
In article <[EMAIL PROTECTED]> you wrote:
> Nah, just look at /proc/cpuinfo, /proc/pci (or use lspci), dmesg, etc
> It's almost all there for you. Not like the old days...
lshw is fine for collecting the above information. If you need more
detection try discover (Progeny) or Kudzu (Redhat) both av
> ... but on a second thought: how do I find this information out ion my
> own and what does "SMP" stand for?
my understanding is that all of the post-k6/III CPUs from AMD are K7-ish.
[well, the 32-bit non-AMD64 cpus anyway... if there are other quirks *I*
would like to know.] you'd know if you h
I just wanted to take the opportunity to thank everyone in the Debian
community for their hard work on the cleanup and forensic analysis of the
recent system compromise.
As a security engineer, I would like to say that this compromise was the
cleanest, most professionally handled that I have encou
peace bwitchu wrote:
> Well the thing about Debian kernel source is they
> incorporate more than just security patches into their
> source.
How do I find out which patches exactly are compiled in the Debian
kernel source? Thanks,
Phil
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subje
64 matches
Mail list logo