Re: Debian Stable server hacked

2003-08-13 Thread Colin Walters
On Wed, 2003-08-13 at 00:20, Adam Majer wrote: > So, now I don't run a Debian kernel at all - only a monolithic > (no modules) kernel with grsecurity.net patches. Then I set > up the ACL system (more or less) so that all of the services > that can be used to break into the system are quite useless

Re: Debian Stable server hacked

2003-08-13 Thread Colin Walters
On Wed, 2003-08-13 at 16:02, Colin Walters wrote: > Let me give an example of how SELinux protects my machine (verbum.org). > My blog is a Python script (pyblosxom) which runs in a domain called > httpd_user_script_t. Oh, and what I forgot to mention about this domain is that it doe

Re: Debian Stable server hacked

2003-08-13 Thread Colin Walters
On Wed, 2003-08-13 at 18:39, valerian wrote: > > grsec handles this by allowing you to restrict Linux capabilities for a > process. For example, there's no reason /usr/sbin/apache should have > access to CAP_SYS_ADMIN (allows mount/umount, amongst other things) or > CAP_SYS_PTRACE (run ptrace) o

Re: Debian Stable server hacked

2003-08-14 Thread Colin Walters
On Wed, 2003-08-13 at 21:00, valerian wrote: > Well capabilities are only one of the things that grsec implements. You > can also restrict a process to access various parts of the filesystem. > There's no reason /usr/sbin/apache should have write access to /etc, so > you just don't allow it. Rig

Re: Debian Stable server hacked

2003-08-14 Thread Colin Walters
On Wed, 2003-08-13 at 00:20, Adam Majer wrote: > So, now I don't run a Debian kernel at all - only a monolithic > (no modules) kernel This doesn't provide very much security. For example: http://www.phrack.org/show.php?p=58&a=7

Re: getting started with SELinux

2003-11-28 Thread Colin Walters
On Fri, 2003-11-28 at 06:03, Forrest L Norvell wrote: > Hi! > > I'm attempting to set up an SELinux system using the Debian packages > and am unashamed to admit that I'm a little stuck at the moment. If you're planning to run a production system, I'd recommend starting from Debian woody and Brian

Re: Security patches

2003-11-29 Thread Colin Walters
On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > SELinux only uses LSM which makes it easy to port, but seems > impractical and even dangerous for real-world use [1][2]. The main complaint on those pages seems to be that LSM is only focused on access control. You may or may not regard that as a

Re: Security patches

2003-11-29 Thread Colin Walters
[moved to debian-security, where it belongs] On Sat, 2003-11-29 at 22:47, David Spreen wrote: > Even if you're perfectly right with that, I consider it important to > provide our users the possibility to make their own choice regarding the > acl systems to use. You always have a choice to upload

Re: Security patches

2003-11-29 Thread Colin Walters
On Sat, 2003-11-29 at 22:53, Colin Walters wrote: > > Nevertheless I again would like to suggest a policy that forces the > > maintainers of packages to deliver informations about used system > > resources > > of their programs. However, this is not such a bad idea, if

Re: Security patches

2003-12-01 Thread Colin Walters
On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > - It needs an extra account ("security officer" with UID 400) which is > a pretty bad idea IMHO. Since once you are SO (cracked/sniffed > password etc.), you can alter anything which seems like a giant > security risk to me. If the password

Re: Debian Stable server hacked

2003-08-14 Thread Colin Walters
On Wed, 2003-08-13 at 16:02, Colin Walters wrote: > Let me give an example of how SELinux protects my machine (verbum.org). > My blog is a Python script (pyblosxom) which runs in a domain called > httpd_user_script_t. Oh, and what I forgot to mention about this domain is that it doe

Re: Debian Stable server hacked

2003-08-14 Thread Colin Walters
On Wed, 2003-08-13 at 00:20, Adam Majer wrote: > So, now I don't run a Debian kernel at all - only a monolithic > (no modules) kernel with grsecurity.net patches. Then I set > up the ACL system (more or less) so that all of the services > that can be used to break into the system are quite useless

Re: Debian Stable server hacked

2003-08-14 Thread Colin Walters
On Wed, 2003-08-13 at 18:39, valerian wrote: > > grsec handles this by allowing you to restrict Linux capabilities for a > process. For example, there's no reason /usr/sbin/apache should have > access to CAP_SYS_ADMIN (allows mount/umount, amongst other things) or > CAP_SYS_PTRACE (run ptrace) o

Re: getting started with SELinux

2003-11-28 Thread Colin Walters
On Fri, 2003-11-28 at 06:03, Forrest L Norvell wrote: > Hi! > > I'm attempting to set up an SELinux system using the Debian packages > and am unashamed to admit that I'm a little stuck at the moment. If you're planning to run a production system, I'd recommend starting from Debian woody and Brian

Re: Security patches

2003-11-29 Thread Colin Walters
On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > SELinux only uses LSM which makes it easy to port, but seems > impractical and even dangerous for real-world use [1][2]. The main complaint on those pages seems to be that LSM is only focused on access control. You may or may not regard that as a

Re: Security patches

2003-11-29 Thread Colin Walters
[moved to debian-security, where it belongs] On Sat, 2003-11-29 at 22:47, David Spreen wrote: > Even if you're perfectly right with that, I consider it important to > provide our users the possibility to make their own choice regarding the > acl systems to use. You always have a choice to upload

Re: Security patches

2003-11-29 Thread Colin Walters
On Sat, 2003-11-29 at 22:53, Colin Walters wrote: > > Nevertheless I again would like to suggest a policy that forces the > > maintainers of packages to deliver informations about used system > > resources > > of their programs. However, this is not such a bad idea, if

Re: Security patches

2003-12-01 Thread Colin Walters
On Sat, 2003-11-29 at 04:05, Martin Pitt wrote: > - It needs an extra account ("security officer" with UID 400) which is > a pretty bad idea IMHO. Since once you are SO (cracked/sniffed > password etc.), you can alter anything which seems like a giant > security risk to me. If the password

Re: SSH install in Woody

2001-09-10 Thread Colin Walters
Jeff Coppock <[EMAIL PROTECTED]> writes: > I'm having trouble getting ssh installed on my new woody system. > I'm getting segmentation faults during the ssh-keygen process. I > can't find any reason for this. Are you familiar with GDB? You should download the source to the ssh package (apt-get

Re: SSH install in Woody

2001-09-10 Thread Colin Walters
Jeff Coppock <[EMAIL PROTECTED]> writes: > I'm having trouble getting ssh installed on my new woody system. > I'm getting segmentation faults during the ssh-keygen process. I > can't find any reason for this. Are you familiar with GDB? You should download the source to the ssh package (apt-get