Hi Nico!
Let's keep debian-security in the discussion to see what others have
to say about this.
Technically I agree with you when you say that people shouldn't enter
anything but their usernames at the login prompt, but the fact is that
people (like me and the bug submitter for example) *do* ent
Johan Walles wrote:
Hi Nico!
Let's keep debian-security in the discussion to see what others have
to say about this.
Technically I agree with you when you say that people shouldn't enter
anything but their usernames at the login prompt, but the fact is that
people (like me and the bug submitter
--On Thursday, August 28, 2008 09:03:05 +0200 Johan Walles
<[EMAIL PROTECTED]> wrote:
Let's keep debian-security in the discussion to see what others have
to say about this.
you try to solve a non-technical problem in a technical way.
Dirk
--
[EMAIL PROTECTED]
--
To UNSUBSCRIBE, email
Hi Johan,
* Johan Walles <[EMAIL PROTECTED]> [2008-08-28 11:46]:
> Let's keep debian-security in the discussion to see what others have
> to say about this.
>
> Technically I agree with you when you say that people shouldn't enter
> anything but their usernames at the login prompt, but the fact is
2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>:
> Johan Walles wrote:
>> Security shouldn't be based on nobody ever doing more or less common
>> mistakes.
>
> auth.log was invented for this reason, and separated to standard log:
> it should be readable only by root, because users do errors.
It
Hi Johan,
* Johan Walles <[EMAIL PROTECTED]> [2008-08-28 13:14]:
> 2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>:
[...]
> > So auth.log should log usernames, so that users don't do
> > wrong assumption that password are not accessible by root!
>
> I can see a point in logging *valid* usernam
On Thu, 28 Aug 2008, Johan Walles wrote:
> 2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>:
> > Johan Walles wrote:
> >> Security shouldn't be based on nobody ever doing more or less common
> >> mistakes.
> >
> > auth.log was invented for this reason, and separated to standard log:
> > it shoul
Mark Brown wrote:
On Thu, Aug 28, 2008 at 01:05:19PM +0200, Johan Walles wrote:
2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>:
auth.log was invented for this reason, and separated to standard log:
it should be readable only by root, because users do errors.
It's readable by anybody wi
This one time, at band camp, Johan Walles said:
> 2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>:
> > Johan Walles wrote:
> >> Security shouldn't be based on nobody ever doing more or less common
> >> mistakes.
> >
> > auth.log was invented for this reason, and separated to standard log:
> > it
On Thu, Aug 28, 2008 at 01:05:19PM +0200, Johan Walles wrote:
> 2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>:
> > auth.log was invented for this reason, and separated to standard log:
> > it should be readable only by root, because users do errors.
> It's readable by anybody with physical a
On 2008-08-28 13:05, Johan Walles wrote:
> It's readable by anybody with physical access to the hardware.
If their have physical access to the hardware, auth.log would be
my least worry.
> That doesn't mean Debian should *help* root doing that in a default
> install. Security by default, anybody
On Thu, Aug 28, 2008 at 09:36:41AM +0200, Giacomo A. Catenazzi wrote:
> auth.log was invented for this reason, and separated to standard log:
> it should be readable only by root,
Then there is a bug in another package if this is what "should" be, because
/var/log/auth.log is readable by group adm
On Thu, Aug 28, 2008 at 02:37:37PM -0700, Steve Langasek wrote:
On Thu, Aug 28, 2008 at 09:36:41AM +0200, Giacomo A. Catenazzi wrote:
auth.log was invented for this reason, and separated to standard log:
it should be readable only by root,
Then there is a bug in another package if this is what
Nico Golde un jour écrivit:
Hi Johan,
* Johan Walles <[EMAIL PROTECTED]> [2008-08-28 13:14]:
2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>:
[...]
So auth.log should log usernames, so that users don't do
wrong assumption that password are not accessible by root!
I can see a point in loggi
On Thu, Aug 28, 2008 at 02:37:37PM -0700, Steve Langasek wrote:
> On Thu, Aug 28, 2008 at 09:36:41AM +0200, Giacomo A. Catenazzi wrote:
> > auth.log was invented for this reason, and separated to standard log:
> > it should be readable only by root,
>
> Then there is a bug in another package if th
Hi,
It is not often that I post but
1) Logging invalid usernames which can be used to detect all manor of
attacks including dictionary username attacks and password brute force
attacks.
2) As pointed out earlier the file is root only access. The argument
that can be read if you physical ac
A. Dreyer un jour écrivit:
On Thu, 28 Aug 2008, Johan Walles wrote:
Anyway root already has the capability to view passwords
(i.e. by installing alternate login programs, sniffing tty, ...)
That's obviously true, but that doesn't cover the case when logs are
copied to a second system with
Hi,
Please add Debian Security Advisory info for CVE-2008-2812.
http://www.debian.org/security/2008/dsa-1630
and if there is no page for the vulnerability, please check
http://lists.debian.org/debian-security-announce/ , then link
to mail archive.
Thanks.
--
Regards,
Hideki Yamane
On 2008-08-28 20:40, Simon Valiquette wrote:
> That's obviously true, but that doesn't cover the case when logs are
> copied to a second system with sysadmins that doesn't have access to the
> first server. And if someone use the standard 514 syslog port instead of
> using an SSL tunnel or th
W. Martin Borgert un jour écrivit:
On 2008-08-28 20:40, Simon Valiquette wrote:
That's obviously true, but that doesn't cover the case when logs are
copied to a second system with sysadmins that doesn't have access to the
first server. And if someone use the standard 514 syslog port instead
20 matches
Mail list logo