Re: Woody Backport of tripwire

2004-04-22 Thread Noah Meyerhans
On Fri, Apr 23, 2004 at 02:48:33AM +0200, Marcin Orda wrote: > I've got tripwire packages that I use internally at work. They're built > for woody, and I'd be happy to share them with anybody who's interested. > They aren't in any way based on the tripwire packages from unstable, so > I don't know

Re: Woody Backport of tripwire

2004-04-23 Thread Noah Meyerhans
On Fri, Apr 23, 2004 at 03:48:59PM -0400, Phillip Hofmeister wrote: > Therefore, in my mind, "it is mean for sid" is not an excuse to omit a > build dependency. What is to say there won't be a g++2 and g++3 package in > sarge when it is released? If the build dependency is part of "build-essentia

Re: restricting process limit

2004-04-26 Thread Noah Meyerhans
On Mon, Apr 26, 2004 at 06:44:35PM +0200, LeVA wrote: > So when I'm getting a large amount of messages there is approx. 15-20 > spamc/spamd running. I want to limit this to ~5. How can I do this. The First of all, this is OT for debian-security. It should have gone to debian-user. Second, RTFM

Re: Security for woody after woody->sarge ?

2004-06-10 Thread Noah Meyerhans
On Thu, Jun 10, 2004 at 02:28:49PM +0100, Alex Owen wrote: > I ask as I'm commisioning a woody system and cannot upgrade to sarge till > July/August 2005 so I'll probably need a year of woody security updates. I don't think you have much to worry about. The infrastructure is in place and was used

Re: rbl's status?

2004-06-13 Thread Noah Meyerhans
On Sun, Jun 13, 2004 at 07:46:15PM +0300, Vassilii Khachaturov wrote: > > What are the recommended rbl's these days? > > Best thing is ask on NANAE or exim-users or whatever your favourite MTA is. > Here's what I am using here RBL-wise: > > rbl_domains = bl.spamcop.net/reject : > relays.osirusof

Re: On Mozilla-* updates

2005-07-30 Thread Noah Meyerhans
Most other OS vendors are willing to make updates for errata beyond simple security updates. Often this means minor updates to software packages like web browsers. I believe the community will be better able to help us prepare e.g. bug-free firefox 1.0.5 packages than it will to produce 1.0.4+sec

Re: On Mozilla-* updates

2005-08-01 Thread Noah Meyerhans
On Mon, Aug 01, 2005 at 04:57:31PM -0700, Thomas Bushnell BSG wrote: > > IMHO, sloopy security support (by uploading new upstream versions) is > > better than no security support. > > Are you prepared to make sure all the packages that depend on mozilla > will have packages ready to enter at once?

Re: On Mozilla-* updates

2005-08-02 Thread Noah Meyerhans
On Tue, Aug 02, 2005 at 10:09:13AM -0700, Thomas Bushnell BSG wrote: > >> > IMHO, sloopy security support (by uploading new upstream versions) is > >> > better than no security support. > >> > >> Are you prepared to make sure all the packages that depend on mozilla > >> will have packages ready to

Re: On Mozilla-* updates

2005-08-02 Thread Noah Meyerhans
On Tue, Aug 02, 2005 at 09:56:12PM +0200, Petter Reinholdtsen wrote: > > [Noah Meyerhans] > >> How about actually maintaining them? > > > > That's exactly what I think we should do. > > Is this "we" as in you, or "we" as in someone els

Re: security.debian.org timeouts

2005-09-19 Thread Noah Meyerhans
On Mon, Sep 19, 2005 at 09:18:29PM +0200, No?l K?the wrote: > anybody knows what's the problem with klecker/security.d.o? > The whole day I get timeouts but I could update xfree(woody)/xorg(sarge) > on some machine but I didn't find the DSA for it. > > Any information about this? See http://lists

Re: security.debian.org timeouts

2005-09-19 Thread Noah Meyerhans
On Mon, Sep 19, 2005 at 10:45:37PM +0200, Bartosz Fenski aka fEnIo wrote: > I wonder what else should I read to keep in touch with such important > information? slashdot? ;) signature.asc Description: Digital signature

Re: security.debian.org mirrors?

2005-09-29 Thread Noah Meyerhans
On Thu, Sep 29, 2005 at 09:50:34PM +0200, Arnaud Fontaine wrote: > Is it possible to have a warranty that the package in the mirror archive > hasn't be modified by someone else ? Maybe my question is stupid but i > wasn't able to find an answer on replicator website ;). Is this really more impor

Re: [SECURITY] [DSA 866-1] New Mozilla packages fix several vulnerabilities

2005-10-20 Thread Noah Meyerhans
On Thu, Oct 20, 2005 at 07:22:30AM -0400, Baxley, Dewayne (ISS Atlanta) wrote: > Please unscribe me from this list. Thanks! Instructions for unsubscribing are included at the bottom of every message posted to the list. Please follow them. noah signature.asc Description: Digital signature

Re: Is there a known rpc.statd buffer overflow?

2005-11-09 Thread Noah Meyerhans
On Wed, Nov 09, 2005 at 10:28:53AM -0500, Kevin B. McCarty wrote: > I received the following (see below) in an email from logcheck on my > home desktop running Sarge. Looks like an attempt to cause a buffer > overflow in rpc.statd. System logs don't include anything else that > looks suspicious.

Re: What is a security bug?

2005-11-23 Thread Noah Meyerhans
On Wed, Nov 23, 2005 at 12:59:02PM +0100, Florian Weimer wrote: > Availability is typically considered one aspect of security (and > arguably the hardest one to get right in networked applications). I tend to consider it the other way around. Security is a subset of availability. Availability mu

Re: closing unwanted ports - and what is 1720/tcp filtered H.323/Q.931

2005-12-15 Thread Noah Meyerhans
On Thu, Dec 15, 2005 at 12:35:09PM +, kevin bailey wrote: > the service: > 443/tcp open https > is used to protect the webmail service. it is meant to stop the email > passwords from being sniffed. If you're concerned about passwords being sniffed, you better shut off pop3 and imap, too

Re: closing unwanted ports - and what is 1720/tcp filtered H.323/Q.931

2005-12-15 Thread Noah Meyerhans
On Thu, Dec 15, 2005 at 06:46:02PM +0100, Florian Weimer wrote: > > It may be nothing. The fact that it showed up as filterd in the nmap > > output indicates that nmap didn't received a TCP RST packet back when it > > tried to contact that port. That may mean you have iptables configured > > to D

Re: closing unwanted ports - and what is 1720/tcp filtered H.323/Q.931

2005-12-15 Thread Noah Meyerhans
On Thu, Dec 15, 2005 at 10:19:48PM +, kevin bailey wrote: > good point - also the fact that the users stick their email passwords to > their monitors using postits! Well, at least there's still *some* level of physical security there; an attacker has to be at your user's desk to get the passwo

Re: Security implications of allowing init to re-exec from another path

2006-01-04 Thread Noah Meyerhans
On Wed, Jan 04, 2006 at 06:25:02PM +0100, martin f krafft wrote: > > Nevertheless the sysvinit maintainers thought it would be a good > > idea to ask here whether anyone sees any security problems arising > > from this feature. > > ... sounds like a nice way to infest a system with a trojan, in >

Re: Debian Kernel security status?

2006-04-19 Thread Noah Meyerhans
On Wed, Apr 19, 2006 at 03:56:41PM -0600, Michael Loftis wrote: > Increasingly 2.6 is unsuitable for production use due to its huge amount of > change and lack of stable tree. There was a decision to do away with the > old split development/odd numbered development model sometime after about >

Re: [SECURITY] [DSA 1111-1] New Linux kernel 2.6.8 packages fix privilege escalation

2006-07-18 Thread Noah Meyerhans
On Mon, Jul 17, 2006 at 06:13:28PM +0200, Moritz Muehlenhoff wrote: > > This was an error on my side, it's already corrected on the web: > http://www.debian.org/security/2006/dsa- > Any idea why this DSA isn't linked to from http://www.debian.org/security/ ? The document is there, but there

Re: When are security updates effective?

2006-08-30 Thread Noah Meyerhans
On Tue, Aug 29, 2006 at 10:54:45PM +0200, Moritz Muehlenhoff wrote: > If there's anything special to do (e.g. kernel or glibc) we alredy add this > to the DSA text. I don't think that's quite enough. I have a few hundred Debian workstations for which I'm responsible, and it's difficult for me to

Re: OpenSSL: RSA Signature Forgery (CVE-2006-4339)

2006-09-06 Thread Noah Meyerhans
On Wed, Sep 06, 2006 at 06:14:51PM +0200, Allard Hoeve wrote: > Please take note of: > > http://www.openssl.org/news/secadv_20060905.txt Acknowledged. A fix is already in the works. noah signature.asc Description: Digital signature

Re: [SECURITY] [DSA 1195-1] new openssl096 packages fix denial of service

2006-10-10 Thread Noah Meyerhans
On Tue, Oct 10, 2006 at 09:22:43PM -0400, David Kennedy CISSP wrote: > signed by a key not included in > http://www.debian.org/security/keys.txt and not on the PGP.COM, > MIT.EDU or any other of several public key servers. It's on pgp.mit.edu (http://pgp.mit.edu:11371/pks/lookup?search=noahm%40deb

Re: Remote Root In Nvidia xserver Driver

2006-10-17 Thread Noah Meyerhans
On Wed, Oct 18, 2006 at 02:11:24AM +0100, paddy wrote: > > NB: although some are saying this is a local root exploit only, the > > bulletin points out it can be exploited by visiting a malicious > > webpage. > > I've not scrutinised the claims closely, but it looks like a remote > vulnerability to

Re: texinfo update?

2006-11-26 Thread Noah Meyerhans
On Sun, Nov 26, 2006 at 12:47:55AM +0100, Alexander Klauer wrote: > there has been a texinfo update for sarge available from > security.debian.org for a few days now. The changelog in the > source package says something about arbitrary code execution. > The GPG signature by Noah

Re: [SECURITY] [DSA 1258-1] New Mozilla Firefox packages fix several vulnerabilities

2007-02-07 Thread Noah Meyerhans
On Wed, Feb 07, 2007 at 04:38:30PM +0100, Holger Levsen wrote: > > Lalala > > WTF? At least you used a proper from:-header... > > Could you *please* correct your errors (which are no problem per se) correct > in a professional way? The errors have already been corrected: http://www.debian.o

Re: [SECURITY] [DSA 1285-1] New wordpress packages fix multiple vulnerabilities

2007-05-01 Thread Noah Meyerhans
On Tue, May 01, 2007 at 11:18:22AM -0700, Michael Leibowitz wrote: > The DSA incorrectly identifies etch as the unstable distribution. > Yeah, my fault. The web site will have it listed correctly, of course. noah signature.asc Description: Digital signature

Re: spooky windows script

2007-05-08 Thread Noah Meyerhans
On Tue, May 08, 2007 at 05:34:30PM -0400, Gerardo Curiel wrote: > El mar, 08-05-2007 a las 22:24 +0200, Thomas Hochstein escribi?: > > Chris Adams schrieb: > > > > > Do you have a VNC server installed? > > > > | But I do have vino-server running. > > That's the problem, the same happened to me

Re: [SECURITY] [DSA 1292-1] New qt4-x11 packages fix cross-site scripting vulnerability

2007-05-15 Thread Noah Meyerhans
On Wed, May 16, 2007 at 09:03:12AM +1000, Andrew Vaughan wrote: > > Package: qt4-x11 > > > For the stable distribution (etch), this problem has been fixed in > > version 4.2.1-2etch1 > > > Etch shipped with 4.2.1-2+b1 packages. > > $ dpkg --compare-versions "4.2.1-2+b1" ">>" "4.2.1-2etc

Re: [SECURITY] [DSA 1291-1] New samba packages fix multiple vulnerabilities

2007-05-16 Thread Noah Meyerhans
On Wed, May 16, 2007 at 09:39:56PM +0200, Thomas Korber wrote: > Moritz Muehlenhoff <[EMAIL PROTECTED]> writes: > > >> Nice work on getting this out. Is sarge going to get an update, is it > >> even affected? I've looked into CVE-2007-2444, and > >> http://www.securityfocus.com/bid/23974/ says tha

Re: [SECURITY] [DSA 1376-1] New kdebase packages fix authentication bypass

2007-09-21 Thread Noah Meyerhans
On Fri, Sep 21, 2007 at 04:24:38PM +0100, Steve Kemp wrote: > > It seems at kdebase and fetchmailconf depencies are broken. > > I don't see what the source of this is. > > > kdebase: Depends: kappfinder (>= 4:3.5.5a.dfsg.1-6etch1) but > > 4:3.5.5a.dfsg.1-6 is installed. > > kappfinder is a

Re: [SECURITY] [DSA 1376-1] New kdebase packages fix authentication bypass

2007-09-21 Thread Noah Meyerhans
On Fri, Sep 21, 2007 at 04:48:34PM +0100, Adam D. Barratt wrote: > I'm guessing the people reporting problems are i386 users. > > > > kdebase: Depends: kappfinder (>= 4:3.5.5a.dfsg.1-6etch1) but > > > 4:3.5.5a.dfsg.1-6 is installed. > > > > kappfinder is a binary coming from the kdebase packa

Re: [SECURITY] [DSA 1376-1] New kdebase packages fix authentication bypass

2007-09-21 Thread Noah Meyerhans
On Fri, Sep 21, 2007 at 12:04:22PM -0400, Noah Meyerhans wrote: > > kdebase is arch:all and therefore installable on i386. kappfinder isn't > > and there aren't any i386 binary packages for it available. > > This problem is being worked on right now and will be cor

Re: [SECURITY] [DSA 1409-1] New samba packages fix several vulnerabilities

2007-11-23 Thread Noah Meyerhans
On Fri, Nov 23, 2007 at 11:10:09AM +0100, Alfio wrote: > (Reading database ... 360460 files and directories currently installed.) > Preparing to replace samba 3.0.24-6etch4 (using > samba_3.0.24-6etch5_i386.deb) ... > invoke-rc.d: dangling symlink: /etc/rc2.d/S91samba > dpkg: warning - old pre-rem

Re: netstat shows strange output

2008-01-06 Thread Noah Meyerhans
On Sun, Jan 06, 2008 at 01:36:26PM -0600, William Twomey wrote: > > I also disabled ipv6, which I was seeing a lot of from this host. Probably not, unless you've knowingly configured IPv6 routing and all that; you were probably seeing a lot of IPv4 mapped v6 addresses, which look (in netstat) lik

Re: [SECURITY] [DSA 1458-1] New openafs packages fix denial of service vulnerability

2008-01-10 Thread Noah Meyerhans
On Thu, Jan 10, 2008 at 05:29:18PM -0500, Thomas Bushnell BSG wrote: > This is not sufficient advice for how to upgrade. Merely installing a > new version of openafs-modules-source will not build it. Some form of > m-a invocation as well will be necessary. Except that the security flaw is in the

Re: [SECURITY] [DSA 1458-1] New openafs packages fix denial of service vulnerability

2008-01-10 Thread Noah Meyerhans
On Thu, Jan 10, 2008 at 11:25:07PM -0500, Thomas Bushnell BSG wrote: > > Except that the security flaw is in the fileserver, which does not > > involve the kernel module at all and runs fine even without it > > installed. > > Surely. But then the security update shouldn't mention unaffected > pac

Re: [SECURITY] [DSA 1458-1] New openafs packages fix denial of service vulnerability

2008-01-11 Thread Noah Meyerhans
On Fri, Jan 11, 2008 at 01:24:28AM -0500, Thomas Bushnell BSG wrote: > If a security bug were found in the afs client-side package, which is > implemented as a kernel module, would the announcement not look just > like the one we saw for DSA 1458-1? See for yourself: http://www.debian.org/security

Re: [SECURITY] [DSA 1458-1] New openafs packages fix denial of service vulnerability

2008-01-11 Thread Noah Meyerhans
On Fri, Jan 11, 2008 at 12:53:08PM -0500, Joey Hess wrote: > Noah Meyerhans wrote: > > We mention all the binary packages in the advisory because they're the > > versions that are going to be installed by apt* and people are going > > to want checksums, file sizes, etc.

Re: [DSA 1494-1] Missing update for user-mode-linux (was: [SECURITY] [DSA 1494-1] New linux-2.6 packages fix privilege escalation)

2008-02-12 Thread Noah Meyerhans
On Tue, Feb 12, 2008 at 04:09:00PM +0100, Nicolas Boullis wrote: > > I think this package deserves an official upgrade. It'll get one. The severity of the issue dictates that we release kernel builds for the various architectures as soon as we get them, rather than waiting until they're all read

Re: [DSA 1494-1] Still vulnerable?

2008-02-13 Thread Noah Meyerhans
On Wed, Feb 13, 2008 at 06:23:16PM -0200, Martin Spinassi wrote: > > > I just upgraded my linux-source-2.6.18 to 2.6.18.dfsg.1-18etch1_all and > > > build a new linux-image. But after installing an rebooting I still was > > > able to become root with this exploit: > > > http://milw0rm.com/exploits

Re: Recent updates

2008-02-17 Thread Noah Meyerhans
On Sun, Feb 17, 2008 at 03:12:26PM -0500, Jim Popovitch wrote: > > http://lists.debian.org/debian-announce/debian-announce-2008/msg0.html > > One additional thing that is not clear to me is that I see pending > updates for libc6 and libc6-dev that are NOT mentioned in that > announcement. No?

Re: DSA-1494-1 - Graphics errors

2008-02-21 Thread Noah Meyerhans
On Thu, Feb 21, 2008 at 01:16:33PM +0100, Thomas Hungenberg wrote: > I am a little bit surprised that - apart from small graphics errors > and some performance issues - the fglrx driver runs fine without > the kernel module. > I thought that starting x.org would fail if the kernel module is not > a

Re: Is oldstable security support duration something to be proud of?

2008-03-10 Thread Noah Meyerhans
On Mon, Mar 10, 2008 at 01:36:46PM -0500, Filipus Klutiero wrote: > I reported #468765 about a questionable statement on www.debian.org. Frank > Lichtenheld wants this to be discussed. > > This statement is in a security announcement. Martin Schulze confirmed that > he > wrote the statement. Do

Re: Is oldstable security support duration something to be proud of?

2008-03-10 Thread Noah Meyerhans
On Mon, Mar 10, 2008 at 04:33:53PM -0400, Filipus Klutiero wrote: > > Their public one, the one you referenced. > Argh. If I'm asking about a statement, that's because I read it. Obviously, > the author didn't bother checking whether he was right, which is why I'm > asking whether there are some

Re: [SECURITY] [DSA 1565-1] New Linux 2.6.18 packages fix several vulnerabilities

2008-05-04 Thread Noah Meyerhans
On Mon, May 05, 2008 at 02:57:34AM +0200, Peter Palfrader wrote: > On Mon, 05 May 2008, Bernd Eckenfels wrote: > > > In article <[EMAIL PROTECTED]> you wrote: > > > Apropos. Is there a way to get that information from a vmlinuz file on > > > disk? Without booting it, that is. > > > > Interestin

Re: securing server

2008-05-09 Thread Noah Meyerhans
On Fri, May 09, 2008 at 05:54:40AM -0700, phobot wrote: > On May 7, 1:10 pm, martin f krafft <[EMAIL PROTECTED]> wrote: > > > use integrit/aide/tripwire > > > > only useful with read-only media > > OK, I don't get it if the media is read-only none can alter it so you > don't really need tripwire.

Re: openssl/openssh fixes for lenny (testing)

2008-05-14 Thread Noah Meyerhans
On Wed, May 14, 2008 at 10:39:10AM -0700, Harry Edmon wrote: > Are there any plans to issue the same openssl/openssh security fixes for > lenny has have been done for etch? OpenSSL has already been fixed in lenny. The openssh package containing ssh-vulkey should hit testing tomorrow at the lates

Re: ssh-vulnkey and authorized_keys

2008-05-15 Thread Noah Meyerhans
On Thu, May 15, 2008 at 11:08:58AM +0300, Mikko Rapeli wrote: > > It would be also helpful to print the line as dokuwd.pl does. > > Is there any repository with newer versions of ssh-vulnkey or dokuwd.pl ? > > Try the Ubuntu version which contains a fixed ssh-vulnkey ( > http://www.ubuntu.com/usn/

Re: [SECURITY] [DSA 1605-1] DNS vulnerability impact on the libc stub resolver

2008-07-09 Thread Noah Meyerhans
On Wed, Jul 09, 2008 at 06:10:51PM +0200, Wolfgang Jeltsch wrote: > > At this time, it is not possible to implement the recommended > > countermeasures in the GNU libc stub resolver. > > I don???t have bind9 installed. Am I affected by the libc stub resolver bug? Yes. I suggest that you install

Re: Archived Debian releases without security site: lists.debian.org

2015-05-03 Thread Noah Meyerhans
On Sun, May 03, 2015 at 10:06:20PM +0530, bkpsusmitaa wrote: > I have added the lines. The issue is regarding non-availability of > security keys. Yes, it is about an old laptop that ran superbly in > lenny, but somewhat slower in squeeze, The keys are available in the debian-archive-keyring packa

Re: Debian Mentoring for Security Team

2015-09-09 Thread Noah Meyerhans
On Wed, Sep 09, 2015 at 01:24:05PM -0400, Justin R. Andrusk wrote: > Was just wondering if there was any mentoring opportunities available on > the Debian Security team. Per https://www.debian.org/security/faq#contact you should be contacting t...@security.debian.org to reach the security team.

Re: [SECURITY] [DSA 3438-1] xscreensaver security update

2016-01-11 Thread Noah Meyerhans
On Mon, Jan 11, 2016 at 11:14:52AM -0500, Cindy-Sue Causey wrote: > Just thinking out loud... that maybe the Announce list settings might > need a quick once-over review depending on admin's intentions for it. The ability to send mail to the debian-security-announce list is restricted, and the set

Re: [SECURITY] [DSA 3481-1] glibc security update

2016-02-16 Thread Noah Meyerhans
On Tue, Feb 16, 2016 at 04:32:00PM +0100, Peter Ludikovsky wrote: > A question to those more knowledgeable: we're using our own DNS > servers for all lookups, and those do recursive lookup for any > external addresses. Am I right to assume that Bind9 uses it's own > implementation for DNS lookups?

Re: [SECURITY] [DSA 3501-1] perl security update

2016-03-01 Thread Noah Meyerhans
On Tue, Mar 01, 2016 at 08:35:43PM +0100, Zack Piper wrote: > > "someone take my email off the list or I will report it as harassment." > > Oh wow I forgot about this. They've tried unsubscribing in the past > from other lists just to refuse to follow instructions' I imagine > they're a troll. It

Re: gnupg upload for CVE-2017-7526

2017-08-30 Thread Noah Meyerhans
On Wed, Aug 30, 2017 at 08:49:44AM +0200, Guido Günther wrote: > Hi gnupg maintainers, security team, > attached debdiff addresses the above CVE for jessie. O.k. to upload to > security-master? debian-security@lists.debian.org is the public discussion list and isn't necessarily monitored by the se

Re: haveibeenpwned -> sub...@bugs.debian.org and others

2018-01-06 Thread Noah Meyerhans
On Sat, Jan 06, 2018 at 05:10:10PM +0100, Davide Prina wrote: > https://haveibeenpwned.com/ > > that inform you if your credential have been compromised in data brench > (only for public compromised data). > > I have try it with sub...@bugs.debian.org and this account result > compromised!! for:

Re: package for security advice

2020-03-07 Thread Noah Meyerhans
On Sat, Mar 07, 2020 at 11:46:54AM -0600, Jonathan Hutchins wrote: > The only way to achieve real security is through knowledge. Pressing a > shiny automated button is just going to implement what somebody else thinks > is good for the system they assume you're running. Find the security > websit

Re: package for security advice

2020-03-07 Thread Noah Meyerhans
On Sat, Mar 07, 2020 at 08:22:59PM +1100, Russell Coker wrote: > For subsystems that are complex and security critical (like Apache and Samba > for example) you could have other packages providing check scripts that look > for common configuration choices that might reduce security. Such scripts

Re: Thunderbird in Debian testing

2020-10-21 Thread Noah Meyerhans
On Wed, Oct 21, 2020 at 07:03:35PM +0300, Pavlos Ponos wrote: >Apologies if this should be directed to another list, but I've already >tried in 'debian-testing' with no luck, see [1]here. >In Debian's package tracker I see that Thunderbird in stable through the >security updates is

Re: Thunderbird in Debian testing

2020-10-21 Thread Noah Meyerhans
On Wed, Oct 21, 2020 at 09:22:11PM +0300, Pavlos Ponos wrote: >Thunderbird 1:78.3.1-2 accepted in unstable at 30/09/2020, 21 days passed >since then, so i think it would be enough time to consider it ready for >testing. Normally it would be, but issues (release-critical bugs, test regr

Re: GPG verification of apt packages

2021-01-27 Thread Noah Meyerhans
On Wed, Jan 27, 2021 at 10:23:44AM -0800, Ramin Doe wrote: >This lead me to search for more answers online, where I have found an >article that suggests that package metadata is verified, but that package >contents are not. > > ([1]https://blog.packagecloud.io/eng/2014/10/28/howto-g

Re: GPG verification of apt packages

2021-01-28 Thread Noah Meyerhans
On Thu, Jan 28, 2021 at 10:08:32AM -0800, Ramin Doe wrote: > The signed metadata includes cryptographic checksums of the package > contents.  Thus, package contents can't be modified in storage on the > mirror or in transit to your system without invalidating the checksum, > and

Re: Fwd: Re: Fwd: What is the best free HIDS for Debian

2022-05-13 Thread Noah Meyerhans
Can we please take this tinfoil hat lunacy somewhere else? There are plenty of conspiracy theory forums out there. I'm sure you've got your favorite, but this isn't one. On Fri, May 13, 2022 at 08:15:52PM +0200, Elmar Stellnberger wrote: > I mean Michael Lazin didn´t say anything bad, on the c

Re: How do you guys handle PNG/JPG binary files with potential payloads for all the image viewers?

2022-06-20 Thread Noah Meyerhans
On Mon, Jun 20, 2022 at 06:10:45PM +0200, Sebastian Rose wrote: > >> how do you guys test all of the potential PNG/JPG potential malware > >> payloads > > What's your use-case? As I'm not aware of an vector for GNU/Linux in > normal everyday use¹, I guess you host files for Windows clients? http

Re: How do you guys handle PNG/JPG binary files with potential payloads for all the image viewers?

2022-06-20 Thread Noah Meyerhans
On Mon, Jun 20, 2022 at 09:25:38AM -0700, Noah Meyerhans wrote: > https://security-tracker.debian.org/tracker/source-package/imagemagick > > If you're processing data (images, videos, audio files, etc) from > unknown sources, it's a really good idea to use sandboxing of so

Re: SPAMMED ONCE AGIN !!! (Was: Re: Under 10 bucks, cell phone antenna boosters. qmnh coxehywqphhnsg)

2003-03-30 Thread Noah Meyerhans
On Sun, Mar 30, 2003 at 09:44:05PM +0200, Bernard Lheureux wrote: > The previous one was a porono site promo, now this one !!! > WHY ISN'T THIS LIST PRIVATE ONLY !!! Oh, shut up. We've been through this a number of times. The list is and will remain public. If you do not want the spam, please

Re: Is there a security update for the new sendmail exploit in woody?

2003-04-02 Thread Noah Meyerhans
On Wed, Apr 02, 2003 at 07:57:35AM -0700, Tom Clements wrote: > --Sendmail Users Face Second Major Security Flaw > (31 March 2003) Yes, it's on its way. Expect it very soon. I think the updated packages have all (or almost all) completed building. > Most versions of sendmail do not adequately c

Re: ssh X forwarding problem

2003-04-06 Thread Noah Meyerhans
On Sun, Apr 06, 2003 at 04:50:39PM +0200, First Last wrote: > Any constructive suggestions? For whatever it's worth, I have the exact same problem and have had it for quite some time. As in your case, it's not user error; I have OpenSSH properly configured to allow X11 forwarding on the sshd end,

Re: Re: ssh X forwarding problem

2003-04-06 Thread Noah Meyerhans
On Sun, Apr 06, 2003 at 09:48:42PM +0200, First Last wrote: > It's reassuring to find out I'm not alone with this problem! > My configuration is different, I have no NFS mounts at all. > So the problem can't be related to NFS. Do you have any ListenAddress directives in sshd_config? This discussi

Re: Re: ssh X forwarding problem

2003-04-07 Thread Noah Meyerhans
On Mon, Apr 07, 2003 at 07:02:26PM +0200, First Last wrote: > Your mention of ListenAddress reminded me that > ursa is a firewall; I wonder if my iptables rules are > responsible for the problem. Are you using iptables > on the machine which you have a problem with? Nope, I have no firewalling on

Re: spam block

2003-04-15 Thread Noah Meyerhans
On Tue, Apr 15, 2003 at 02:47:52PM +0200, Konstantin wrote: > I need a spam filter, but I need one which works with sendmail and is > not spamassasin(the system needs an old perl 5.0.X), but spamassasin > needs perl 5.6 When I set up spamassassin on a potato system, I installed perl from source wi

Re: pptpd

2003-04-18 Thread Noah Meyerhans
On Fri, Apr 18, 2003 at 11:09:14PM +0200, Martin Hermanowski wrote: > am I missing an update of pptpd? Today an exploit has been posted to > bugtraq. The update has not yet been released. noah -- ___ | Web: http://web.morgul.net/~frodo/ | PGP

Re: Secure remote syslogging?

2003-04-23 Thread Noah Meyerhans
On Wed, Apr 23, 2003 at 10:09:27PM -0300, Henrique de Moraes Holschuh wrote: > > How do you think switching a separate VLAN for this would be also secure > > enough? Is it a must to use a dedicated device? > > Depends on your switch. A dedicated device is a MUCH better idea. Yes, there are a num

Re: Snort exploit in wild.

2003-04-25 Thread Noah Meyerhans
On Fri, Apr 25, 2003 at 10:44:49PM +0100, Nick Boyce wrote: > The general consensus of opinion (including the Debian packager) was > that *nobody* should even consider using the V1.8.4 Snort package in > Woody - it's much too old, and has a number of security issues. It's not really that it has a

Re: trojan horse on testing?

2003-05-09 Thread Noah Meyerhans
On Fri, May 09, 2003 at 08:34:16PM +0200, tomas pospisek wrote: > > Packages that have security relevant bugs in testing could be kicked > ___immediately___ out of testing. What do people think? That wouldn't help anything. People would have already installed the vulnerable package. apt-get wou

Re: Setting up VPN's

2003-05-16 Thread Noah Meyerhans
On Fri, May 16, 2003 at 03:02:14PM +0200, Giacomo Mulas wrote: > > Will FreeS/WAN's user-mode part (aka pluto) be ported to Linux 2.6 > > IPSec? Otherwise FreeS/WAN is a dead end, while IPSec is the standard. > > No. Umm. It already has been ported to Linux 2.5: http://marc.theaimsgroup.com/?l=

Re: Setting up VPN's

2003-05-16 Thread Noah Meyerhans
On Fri, May 16, 2003 at 05:43:21PM +0200, Giacomo Mulas wrote: > yes, but it was a fork from a specific version of freeswan, if I am not > mistaken. Which means that from that point on they parted ways... I did > not mean to understate the work done by Herbert Xu at all, sorry if I gave > you that

Re: promiscuous mode

2003-05-23 Thread Noah Meyerhans
On Fri, May 23, 2003 at 08:32:27PM +0100, Ian Goodall wrote: > > I have not got multicast enabled either so I don't know what is causing > this... > > Oops looks like I have guys. I have read man 8 ifconfig but it will still > not switch off. Is this what is causing it? You probably don't want to

Re: Advice Needed On Recent Rootings

2003-05-25 Thread Noah Meyerhans
On Sun, May 25, 2003 at 01:04:30PM -0500, Jayson Vantuyl wrote: > We have no idea how he's getting in, but we've got his rootkit fairly > nailed down (he uses a few slightly different ones). If you believe he'll be back, it might be worth it to set up a honeypot and a box running tcpdump and captu

Re: Advice Needed On Recent Rootings

2003-05-25 Thread Noah Meyerhans
> 25 - It is entirely possible this is how the attacker got in. If you can > avoid ftp (by using scp/sftp), do so. This will close 25% of your known > open ports. And anonymous ftp is especially vulnerable. If you want to sound credible you should probably at least know what listens on port 25. (

Re: Advice Needed On Recent Rootings

2003-05-28 Thread Noah Meyerhans
On Wed, May 28, 2003 at 02:06:21PM +0200, Olaf Dietsche wrote: > Just curious, how do you su to root, if root's password is disabled? > Do you have a modified su replacement? su uses PAM. So it doesn't need to use root entry in /etc/passwd. It could do something insane like consult a RADIUS serv

Re: Scanning with reverse connections?

2003-06-05 Thread Noah Meyerhans
On Thu, Jun 05, 2003 at 10:02:53PM +0200, Christoph Haas wrote: > So most probably you see just the second. That's the way TCP works. > Sequential port numbers may show up because the counter of used > high-ports (1024 ff.) is just increased. No, it's not at all uncommon to see incoming traffic fr

Re: Scanning with reverse connections?

2003-06-06 Thread Noah Meyerhans
On Fri, Jun 06, 2003 at 10:12:05PM +0200, Florian Weimer wrote: > > But does nmap generate the packets WITHOUT the SYN flag set? Which is > > what these are... > > In this case, it's probably backscatter. Could you tell us a few > source/destination pairs? I could have a look at our flow databas

Re: Kernel Security Fixes

2003-06-11 Thread Noah Meyerhans
On Thu, Jun 12, 2003 at 01:18:59AM +0200, Peter Holm wrote: > Could please someone of the people with a deeper knowledge explain, if > the mentioned issues are addressed in one of the "stock" debian > kernels or if I have to get the sources from kernel.org and patch it > myself? See DSA 311-1 at

Re: cracked? "rm uses obsolete (PF_INET,SOCK_PACKET)"

2003-06-15 Thread Noah Meyerhans
On Sun, Jun 15, 2003 at 04:29:36PM +0300, Mika Bostr?m wrote: > You must understand that Snort, ACID or any other IDS setup does not > provide any protection against threats. They just monitor what takes > place in the network. > > To really protect against break-ins, install a system monitor.

Re: Secure Proxy

2003-06-15 Thread Noah Meyerhans
On Sun, Jun 15, 2003 at 11:42:33PM +0100, Ian Goodall wrote: > Which is the best proxy server to use on debian? I have heard that > squid is not secure... Can you provide a reference for that statement? It certain seems secure to me At least, I've never had any boxes cracked as a result of it, an

Re: Someone scanned my ssh daemon

2003-06-15 Thread Noah Meyerhans
On Mon, Jun 16, 2003 at 10:08:41AM +1000, Mark Devin wrote: > So they know that I am running debian and what version of ssh I use! I > know that security through obscurity is no security, but I still don't > want to help any attackers. Anyone else have thoughts on this? It is necessary so that t

Re: tripwire .deb for Woody

2004-01-13 Thread Noah Meyerhans
On Tue, Jan 13, 2004 at 01:34:18PM +0100, Lupe Christoph wrote: > Has anybody on this list managed to backport the tripwire package to > Woody? I'm running into a strange problem where configure tries to > locate an include file named "locale". Yes, without an suffix. I don't > know much C++, but t

Re: Hacked - is it my turn? - interesting

2004-02-02 Thread Noah Meyerhans
On Mon, Feb 02, 2004 at 02:06:41PM -0800, Alvin Oga wrote: > > > 'nmap' to those ports gives me: > > > > > >>PORT STATESERVICE > > >>1524/tcp filtered ingreslock > > >>31337/tcp filtered Elite > > turn off those ports ... kill ingress and whatever uses elite > > and keep poking around

Re: Hacked - is it my turn? - interesting

2004-02-02 Thread Noah Meyerhans
On Mon, Feb 02, 2004 at 02:54:33PM -0800, Alvin Oga wrote: > > If you run 'iptables -A INPUT -p tcp --dport 1524 -j REJECT' you'll get > > this exact behavior, with nothing listening on these ports. > > and am wondering, why explicitly reject those ports and not > explicity reject other ports that

Re: Hacked - is it my turn? - interesting

2004-02-03 Thread Noah Meyerhans
On Tue, Feb 03, 2004 at 05:38:40AM +0100, Philipp Schulte wrote: > > Those ports are not showing up as open. 'Filtered' does not mean open. > > If you run 'iptables -A INPUT -p tcp --dport 1524 -j REJECT' you'll get > > this exact behavior, with nothing listening on these ports. > > No, with REJE

Re: DSA 438 - bad server time, bad kernel version or information delayed?

2004-02-18 Thread Noah Meyerhans
On Wed, Feb 18, 2004 at 09:17:13PM +0100, Florian Weimer wrote: > > Does this mean, that a well known exploit was kept back for nearly three > > weeks, just because some odd vendors were unable to build there kernels in > > time? > > Yes, this is the norm. Debian hides security bugs from its us

Re: chkrootkit - possible bad news`

2004-02-24 Thread Noah Meyerhans
On Tue, Feb 24, 2004 at 09:14:05AM +0200, Sneferu wrote: > > Looks like there are a lot of false positives on it. > It looks like there are a lot of false positives with chkrootkit in general. Seriously, has anybody here ever had chkrootkit detect an actual rootkit? Questions about its output

Re: end of Freeswan

2004-03-03 Thread Noah Meyerhans
On Wed, Mar 03, 2004 at 08:43:47AM -0300, Paulo Ricardo wrote: > Sorry for this notice guys.8( > > It's a pity. FreeS/WAN came with enough political baggage that I won't particularly miss it. Particularly given that there is at least one other high quality IPSec implementation available

Re: mozilla - the forgotten package?

2004-03-09 Thread Noah Meyerhans
On Tue, Mar 09, 2004 at 08:53:23PM +0100, Jan L?hr wrote: > So this is all in all a capacity problem? Doesn't have the debian security > team enough ressource to port exisiting patches to debian packages? > Why not enlarging the team? You do not need to be a member of the security team to submit

Re: mozilla - the forgotten package?

2004-03-10 Thread Noah Meyerhans
On Wed, Mar 10, 2004 at 07:44:11PM +0100, Florian Weimer wrote: > Hmm, has there been any Mozilla security update for woody? This looks > like a *lot* of work. Maybe it's better to take some other > distribution's Mozilla 1.4 package and ship that. 8-> That's highly unlikely to happen. It's bee

Re: passwords changed?

2004-04-10 Thread Noah Meyerhans
On Sat, Apr 10, 2004 at 09:19:00PM +0200, LeVA wrote: > I am just curious, that if my proftpd runs as user 'ftp', than the one > who uses this vulnerability could only run arbitrary code as user ftp, > or as root? Only as ftp. But there have been a number of locally exploitable kernel vulnerabi

Re: passwords changed?

2004-04-11 Thread Noah Meyerhans
On Sun, Apr 11, 2004 at 11:15:10AM +0200, LeVA wrote: > I always compile the latest stable 2.4 kernel with loadable modules > disabled, but I don't apply any kernel patches. > Is this "safe", or I must apply some security patch? None of the recent kernel-level vulnerabilities have required module

  1   2   >