Hi all!
I was wondering how bad this actually is and it looks extremely horrible. In
practice, all data transmitter over the wire for the last two years and be
snooped upon (if someone has captured it - and the paranoid must assume
someone has).
Trusting on the security of ssh, we have, for ex
-Juha
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
signature.asc
Description: This is a digitally
three machines, using ftp.fi.debian.org-mirror. How is this
possible?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
so.2.0.2
It's 3-1 for 4b... then. :)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http:/
any other relevant configuration
items?
--
---
| Juha Jäykkä, [EMAIL PROTECTED], Assistant |
| Laboratory of Theoretical Physics |
| Department of Physics, University of
three machines, using ftp.fi.debian.org-mirror. How is this
possible?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
so.2.0.2
It's 3-1 for 4b... then. :)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http:/
any other relevant configuration
items?
--
---
| Juha Jäykkä, [EMAIL PROTECTED], Assistant |
| Laboratory of Theoretical Physics |
| Department of Physics, University of
it.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
feasible?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
lsa-utils was broken last week.)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
what you come up
with. Thanks.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
not non-existent.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
me it is some windows stuff. This does not preclude the
possibility of a backdoor/trojan, though: a wise backdoor would listen
on a port which would be open anyway thus concealing (partly) its
presence.
--
---
| Juha J
, is it a problem?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
it.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject
feasible?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a s
lsa-utils was broken last week.)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCR
what you come up
with. Thanks.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subj
not non-existent.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSU
me it is some windows stuff. This does not preclude the
possibility of a backdoor/trojan, though: a wise backdoor would listen
on a port which would be open anyway thus concealing (partly) its
presence.
--
---
| Juha J
, is it a problem?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE
...
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
ogins over the wire until perhaps now.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
lies did not answer my question at all, some
of them had good points, thanks to those.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
--
.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Cont
What might be the URL/apt-get sources.list line for security fixes of
the non-US packages?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja
an.org security pages might want to
add that non-US security fix URL to the pages. Currently it is not
mentioned there.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www
?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL
pdate, too, and
move the aide.db.new to aide.db. Besides this started right after
installation - before installing anything new.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http:
arded sensitive) as changed, but these files seem
totally random! After this, I reran 'aide --check' and got a segfault.
Repeat as many times as I would, all get segfaulted... Aide broken?
Aide version is sid's: 0.7-10.
--
---
Does anyone happen to know which versions are vulnerable besides the
one DSA mentioned? I have a woody which would need slrn removed if
woody's newest version (that is, 0.9.7.2-4) is vulnerable.
--
---
| Juha J
all machines, since I
doubt my little scheme would be the weakest link in security. The only
problem I can see is in 1. and 2. - could the DSA key be abused to
automatically root all the machines?
Ideas?
--
---
|
there,
though: I basically would have TWO suided programs now though crashing
a program which only runs another should be impossible (unless the init
routines can be crashed).
--
-------
| Juha Jäykkä, [EMAIL PROTECTED]
. (10Base-2)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTEC
ng inside your network over IPSec. No more stealing, I
would think.
There may be other options as well, but that would end all kinds of
network sniffing inside your network.
--
---
| Juha Jä
Of course, there
is a problem if your computers are not very fast - IPSec encrypts
absolutely everything so it really takes some CPU.
--
-------
| Juha Jäykkä, [EMAIL PROTECTED]|
, does it
still need to be suid root? Since inetd runs root anyway, there should
be no need for exim to: the port is already bound when exim starts and
exim will not be able to bind to it anyway. Just wondering if I should
do some dpkg-statoverrides.
--
----
es with the
permissions of /var/spool/mail/.
Now another question: are there?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
hange the whole
_format_ of their version numbers??? 2.9 is lacking one minor version
specifier as compared to 2.9.9, which has two.
TIA.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
or it?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
done with
their computer which is sitting 24/7 on a DSL line - that is most
unfortunate. Ever heard the phrase: "There is nothing valuable on my
computer - why would anyone break into it?" Who would educate them..?
--
-----
...
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
ogins over the wire until perhaps now.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
lies did not answer my question at all, some
of them had good points, thanks to those.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
What might be the URL/apt-get sources.list line for security fixes of
the non-US packages?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
ng the www.debian.org security pages might want to
add that non-US security fix URL to the pages. Currently it is not
mentioned there.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| ho
?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
e, too, and
move the aide.db.new to aide.db. Besides this started right after
installation - before installing anything new.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
arded sensitive) as changed, but these files seem
totally random! After this, I reran 'aide --check' and got a segfault.
Repeat as many times as I would, all get segfaulted... Aide broken?
Aide version is sid's: 0.7-10.
--
---
Does anyone happen to know which versions are vulnerable besides the
one DSA mentioned? I have a woody which would need slrn removed if
woody's newest version (that is, 0.9.7.2-4) is vulnerable.
--
---
| Juha J
all machines, since I
doubt my little scheme would be the weakest link in security. The only
problem I can see is in 1. and 2. - could the DSA key be abused to
automatically root all the machines?
Ideas?
--
---
|
there,
though: I basically would have TWO suided programs now though crashing
a program which only runs another should be impossible (unless the init
routines can be crashed).
--
-------
| Juha Jäykkä, [EMAIL PROTECTED]
. (10Base-2)
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
ng inside your network over IPSec. No more stealing, I
would think.
There may be other options as well, but that would end all kinds of
network sniffing inside your network.
--
---
| Juha Jä
Of course, there
is a problem if your computers are not very fast - IPSec encrypts
absolutely everything so it really takes some CPU.
--
-------
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
, does it
still need to be suid root? Since inetd runs root anyway, there should
be no need for exim to: the port is already bound when exim starts and
exim will not be able to bind to it anyway. Just wondering if I should
do some dpkg-statoverrides.
--
----
es with the
permissions of /var/spool/mail/.
Now another question: are there?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
hange the whole
_format_ of their version numbers??? 2.9 is lacking one minor version
specifier as compared to 2.9.9, which has two.
TIA.
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
or it?
--
---
| Juha Jäykkä, [EMAIL PROTECTED]|
| home: http://www.utu.fi/~juolja/ |
---
done with
their computer which is sitting 24/7 on a DSL line - that is most
unfortunate. Ever heard the phrase: "There is nothing valuable on my
computer - why would anyone break into it?" Who would educate them..?
--
-----
62 matches
Mail list logo