Re: Compromised system - still ok?

2005-02-07 Thread Alvin Oga
On Mon, 7 Feb 2005, Matthew Palmer wrote: > On Sun, Feb 06, 2005 at 10:52:50PM -0800, Alvin Oga wrote: > > it's best when you can call the fbi (on the phone) and say, they're > > back, trace um "NOW" > > Obviously you've never done this. and obviously you seem too lazy to catch the cracker ??

Re: Compromised system - still ok?

2005-02-07 Thread Matthew Palmer
On Sun, Feb 06, 2005 at 11:53:50PM -0800, Alvin Oga wrote: > > On Mon, 7 Feb 2005, Matthew Palmer wrote: > > > On Sun, Feb 06, 2005 at 10:52:50PM -0800, Alvin Oga wrote: > > > it's best when you can call the fbi (on the phone) and say, they're > > > back, trace um "NOW" > > > > Obviously you've

Re: Compromised system - still ok? - let it go

2005-02-07 Thread Alvin Oga
hi ya matt On Mon, 7 Feb 2005, Matthew Palmer wrote: > Three step program for you, bub. > > 1) Place your feet on your shoulders; > 2) Push hard; > 3) Take your first breath of arse-free air in a long time. sounds like you should do the same ... or more like too late for you > I have reporte

Conclusion: Compromised system - still ok?

2005-02-07 Thread DI Peter Burgstaller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Wow you guys, thank you very much for all your input. I'll sit down with the manager and we'll discuss which route to take. My first instinct was to warm up those drives and get the tapes .. but I may want to find out more as you guys have suggested! (

Fwd: [USN-74-1] Postfix vulnerability

2005-02-07 Thread Jan Wagner
-- Forwarded Message -- Subject: [USN-74-1] Postfix vulnerability Date: Sunday 06 February 2005 23:55 From: Wietse Venema <[EMAIL PROTECTED]> To: Postfix announce <[EMAIL PROTECTED]> Cc: Postfix users <[EMAIL PROTECTED]> In a recent announcement on the Full-Disclosure mailing li

Re: Fwd: [USN-74-1] Postfix vulnerability

2005-02-07 Thread Matthijs Mohlmann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Already read this link: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=267837 Jan Wagner wrote: | -- Forwarded Message -- | | Subject: [USN-74-1] Postfix vulnerability | Date: Sunday 06 February 2005 23:55 | From: Wietse Venema <[EMA

Re: Compromised system - still ok?

2005-02-07 Thread Michael Stone
On Sun, Feb 06, 2005 at 11:53:50PM -0800, Alvin Oga wrote: don't accuse others ( me ) of what you haven't done yourself, or dont want to do, as it only makes you look like the script kiddie If anyone in this thread sounds like a kiddie it's you. Mike Stone -- To UNSUBSCRIBE, email to [EMAIL PROTE

Re: Compromised system - still ok?

2005-02-07 Thread Adrian Phillips
> "Matthew" == Matthew Palmer <[EMAIL PROTECTED]> writes: Matthew> I have reported intruders to the relevant authorities in Matthew> the past, and have encountered an apathy field the size Matthew> of a small continent. The only way they will even Well, I think it may depend on w

Re: Compromised system - still ok?

2005-02-07 Thread Jeroen van Wolffelaar
On Mon, Feb 07, 2005 at 12:35:45AM +0100, martin f krafft wrote: > Once an attacker is on the system, you cannot be sure anymore that > you can track his/her actions down. Sophisticated root kits exist to > cover all (!) traces. I co-administer a system with ~ 250 users, a significant part of them

Grsecurity patches on Debian

2005-02-07 Thread Marcus Williams
Hi - Has anyone any advice on using grsecurity on a server running Debian (testing) - I'm thinking about patching my new kernel with the grsecurity stuff and starting to use it but I'm unsure of what I can expect. Are the defaults going to break (or stop from functioning) anything obvious (name

Re: Compromised system - still ok?

2005-02-07 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > I co-administer a system with ~ 250 users, a significant part of them I > don't know very well personally, and really, I don't rule out some of > them might try to do some cracking, of, more likely, has such a shoddy > password policy or infected windows

Re: Compromised system - still ok?

2005-02-07 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: >- works great across the usa, even if the cracked >box they came from was offshore, they can trace it >back to somebody's bedroom or colo is that first hand knowledge or just some usual urband legend? Greetings Bernd -- To UNS

Re: Grsecurity patches on Debian

2005-02-07 Thread Andras Got
Hi, You should start with grsec low and proc restricions set customly. Hardening your kernel is always a option. The grsec default high settings, and PaX break Jetty (java server container) in two, so it simply won't start, gradm won't help as I know. After the grsec default low settings you shou

Re: Compromised system - still ok?

2005-02-07 Thread Alvin Oga
On Mon, 7 Feb 2005, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > >- works great across the usa, even if the cracked > >box they came from was offshore, they can trace it > >back to somebody's bedroom or colo > > is that first hand knowledge or just

Re: Compromised system - still ok?

2005-02-07 Thread James Renken
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sun, 6 Feb 2005, Scott Edwards wrote: > 1. Your box gets compromised > 2. You sue them > 3. And then collect damages > > You'll quickly loose a case if there is any demonstration of > negligence (that tail between your legs about the backup account

Re: Grsecurity patches on Debian

2005-02-07 Thread Jan Lühr
Greetings,.. Am Montag, 7. Februar 2005 14:10 schrieb Andras Got: > Hi, > > You should start with grsec low and proc restricions set customly. > Hardening your kernel is always a option. The grsec default high settings, > and PaX break Jetty (java server container) in two, so it simply won't > sta

Re: Grsecurity patches on Debian

2005-02-07 Thread Thomas Sjögren
On Mon, Feb 07, 2005 at 02:10:07PM +0100, Andras Got wrote: > You should start with grsec low and proc restricions set customly. > Hardening your kernel is always a option. Running grsec isn't a problem, I use on both clients and servers. Dont start with grsec low but with the custom option, CON

Re: Grsecurity patches on Debian

2005-02-07 Thread Andras Got
Hi, That's it, the chpax. I tried these things almost a year ago with JSP thingy. I googled and the like, but chpax didn't help. I meant that I selected high settings, then selected custom, then did some changes. :) A. Thomas Sjögren írta: On Mon, Feb 07, 2005 at 02:10:07PM +0100, Andras Got wro

Re: Compromised system - still ok?

2005-02-07 Thread Ognyan Kulev
Geoff Crompton wrote: So can you be really sure that there was no root kit that succesfully exploited your system? Have you rebooted off a trusted kernel, and cryptographically checked every single file involved in booting? (Such as the grub/lilo, kernel, all modules, init), and visually or cry

Re: Compromised system - still ok?

2005-02-07 Thread Robert Lemmen
On Mon, Feb 07, 2005 at 06:32:12PM +0200, Ognyan Kulev wrote: > Another thing he doesn't like is that check is based on signed MD5 hash of > content instead of based on signed content. Is it true that signed MD5 is > weaker than signed content? assymetric crypto ops are very slow, so you wouldn

Re: Compromised system - still ok?

2005-02-07 Thread Michael Stone
On Mon, Feb 07, 2005 at 06:32:12PM +0200, Ognyan Kulev wrote: He said that after signed Fedora package is installed (by default, only signed packages are installed), you can boot from some CD and then check signatures of each file of each package. Thus, only having key Red Hat's fingerprint, yo

Re: Compromised system - still ok?

2005-02-07 Thread Milan P. Stanic
On Mon, Feb 07, 2005 at 06:25:19PM +1100, Matthew Palmer wrote: > Obviously you've never done this. Good luck finding someone who even knows > what TCP/IP is, let alone sufficient knowledge to be able to track a cracker > in real time with no warning. How smart they are can be seen at: http://www

Re: Compromised system - still ok?

2005-02-07 Thread Matthew Palmer
On Mon, Feb 07, 2005 at 07:26:43PM +0100, Milan P. Stanic wrote: > On Mon, Feb 07, 2005 at 06:25:19PM +1100, Matthew Palmer wrote: > > Obviously you've never done this. Good luck finding someone who even knows > > what TCP/IP is, let alone sufficient knowledge to be able to track a cracker > > in

Re: Grsecurity patches on Debian

2005-02-07 Thread Xavier Sudre
On Monday 07 February 2005 at 16:17, Andras Got wrote: > Hi, > > That's it, the chpax. I tried these things almost a year ago with JSP > thingy. I googled and the like, but chpax didn't help. > > I meant that I selected high settings, then selected custom, then did some > changes. :) > > A. >

Paulo Eduardo Pasquini Marcondes/RJ/Petrobras está ausente do escritório.

2005-02-07 Thread pmarcondes
Estarei ausente do escritório a partir de 02/05/2005 e não retornarei até 02/27/2005. I'll be out of the office from 5 to 27, Feb, and will answer no messages during this period. If this is urgent maater, please forward to Mr. Evaldo Mundim ([EMAIL PROTECTED]). When I got back I'll answer the mes

Re: Compromised system - still ok? - doorstep

2005-02-07 Thread Alvin Oga
hi ya On Mon, 7 Feb 2005, James Renken wrote: .. > The summary in legal terms: contributory negligence is not a defense to an > intentional (or reckless) tort. The first major case I found with an > offhand search is: > > Schellhouse v. Norfolk & W. Ry. Co., 575 N.E.2d 453, 456 (Ohio 1991) t

Re: Mirrors security

2005-02-07 Thread Felipe Massia Pereira
Do I really have to check all .deb files of Packages files if I have already checked all Packages' files themselves and they do check? AFAIK apt-get always check if md5 (from Packages files it downloads) does not match and warns/forbids the user of intalling such a "dirty" package. I mean, what

Re: Grsecurity patches on Debian

2005-02-07 Thread Konstantin Filtschew
hi, I use Grsecurity with High level for over 2 years now on 2.4.X without any problems running debian woody. These daemons works fine: ssh postfix courier-imap (with and without ssl) courier-pop (with and without ssl) apache apache-ssl mysql snort and a view other ... The best way would be for y