Re: logcheck.ignore entries

2004-04-14 Thread Russell Coker
On Thu, 15 Apr 2004 02:01, Jeff Coppock <[EMAIL PROTECTED]> wrote: > I'm having trouble with getting entries here to work. I have the > following /var/log/auth.log messages that I want to filter out of > logcheck (version 1.2.16, sarge): > > CRON[15302]: (pam_unix) session opened for user root by

Re: makedev: /dev/tty([0-9])* should not have 666 permissions

2004-04-19 Thread Russell Coker
On Tue, 20 Apr 2004 07:50, Jan Minar <[EMAIL PROTECTED]> wrote: > It seems like they should be 660, not 600, as I suggested (wall(1) and > talkd(1) would break otherwise, probably). What prevents wall from sending those escape sequences? -- http://www.coker.com.au/selinux/ My NSA Security Enha

Re: Unusual spam recently - hummm - postprocess

2004-06-06 Thread Russell Coker
On Sat, 5 Jun 2004 08:52, Michael Stone <[EMAIL PROTECTED]> wrote: > >So, adding handling for SPF RRs in one's MTA yields significant > >advantages today, despite the technology being new, because _all_ of the > >forgemail claiming to be from aol.com, msn.com, hotmail.com, pobox.com, > >etc. can be

Re: Spam fights

2004-06-10 Thread Russell Coker
On Thu, 10 Jun 2004 18:21, Jaroslaw Tabor <[EMAIL PROTECTED]> wrote: > We are allowing all emails from whitelits. Who is "we" in this context? Individual users or mailing list administrators? > For unknown sender, automated confirmation request is send. If For mailing lists this can be achieved

Re: Spam fights

2004-06-10 Thread Russell Coker
On Fri, 11 Jun 2004 06:03, Alain Tesio <[EMAIL PROTECTED]> wrote: > On Thu, 10 Jun 2004 18:58:33 +1000 > > Russell Coker <[EMAIL PROTECTED]> wrote: > > For mailing lists this can be achieved by making the list > > subscriber-only. For individual accounts such beh

Re: Spam fights

2004-06-11 Thread Russell Coker
On Fri, 11 Jun 2004 19:29, Dale Amon <[EMAIL PROTECTED]> wrote: > On Fri, Jun 11, 2004 at 10:45:44AM +1000, Russell Coker wrote: > > It is anti-social for every idiot on the net to think that they are > > important enough to require a subscription from everyone who wants t

Re: Spam fights

2004-06-11 Thread Russell Coker
On Fri, 11 Jun 2004 21:38, Dale Amon <[EMAIL PROTECTED]> wrote: > That said, those who can afford it will hire human > operators to act as email gatekeepers; those who can't > will use whatever a salesman can convince them is > affordable and works. Whether we like it or not will > not figure into

Re: Hashcash - was re: Spam fights

2004-06-11 Thread Russell Coker
On Fri, 11 Jun 2004 22:34, Patrick Maheral <[EMAIL PROTECTED]> wrote: > It seems that most people here don't like CR systems, and I'd have to > agree with that consensus. > > I'm just wondering what is the general feeling about using hashcash and > other header signatures systems. Currently you ca

Re: Hashcash - was re: Spam fights

2004-06-11 Thread Russell Coker
On Fri, 11 Jun 2004 23:43, [EMAIL PROTECTED] (Rens Houben) wrote: > In other news for Fri, Jun 11, 2004 at 11:24:05PM +1000, Russell Coker has been seen typing: > > Besides, with an army of Windows Zombies you could generate those > > signatures anyway... > > Why both

Re: Spam fights

2004-06-12 Thread Russell Coker
On Sat, 12 Jun 2004 04:22, "s. keeling" <[EMAIL PROTECTED]> wrote: > Incoming from Rick Moen: > > Quoting Russell Coker ([EMAIL PROTECTED]): > > > Some of the anti-spam people are very enthusiastic about their work. I > > > wouldn't be surprised

Re: rbl's status?

2004-06-14 Thread Russell Coker
On Mon, 14 Jun 2004 16:39, Adrian 'Dagurashibanipal' von Bidder <[EMAIL PROTECTED]> wrote: > Also you may want to look at the rfc-ignorant.org ones, but reading > nanae I got the impression that they are more trouble than they're > worth. This thread inspired me to fiddle with my anti-spam settin

Re: password managers

2004-06-14 Thread Russell Coker
On Tue, 15 Jun 2004 04:56, andrew lattis <[EMAIL PROTECTED]> wrote: > currently i've got an ever growing password list in a plain text file > stored on an encrypted loopback fs, this is getting cumbersome... > > figaro's password manager (package fpm) looks nice and uses blowfish to > encrypt data

Re: Kernel Crash Bug????

2004-06-15 Thread Russell Coker
On Tue, 15 Jun 2004 17:24, Rudy Gevaert <[EMAIL PROTECTED]> wrote: > Would it be possible to run that program trough e.g. perl/php/... ? > > A use could ftp the executable and write a php script that execute it. Does PHP allow executing arbitary binaries? If the user can install CGI-BIN scripts t

Re: password managers

2004-06-15 Thread Russell Coker
On Tue, 15 Jun 2004 18:46, Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> wrote: > Some of the applications I run use kwallet, that seems similar to what > Russell Cooker described for OS X. No. kwallet can be ptraced, this allows a hostile program to get access to all it's data with ease. Of cou

Re: /dev/log

2005-07-07 Thread Russell Coker
On Wednesday 06 July 2005 05:05, Ian Eure <[EMAIL PROTECTED]> wrote: > It's used by syslogd. Not 100% sure on this, but I believe it's how > user-space apps send messages to syslog (e.g. with syslog(3)). If that's > the case, it would need to be mode 666 for syslog(3) to work. It doesn't have to b

Re: Bug#357561: privilege escalation hole

2007-04-12 Thread Russell Coker
On Friday 02 March 2007 21:30, Bjørn Mork <[EMAIL PROTECTED]> wrote: > Nor did I. Does anyone have a pointer to a discussion of this? I > assume it must have been discussed a few times already. A few times in other places, not sure about this list. > I think I'll stop using su now ;-) "setsid

Re: Security Debian Questions

2007-04-23 Thread Russell Coker
On Sunday 22 April 2007 01:58, Jim Popovitch <[EMAIL PROTECTED]> wrote: > On Fri, 2007-04-20 at 20:30 -0500, George P Boutwell wrote: > > I don't remember the exact details, but the problem I think revolved > > around not being able to properly boot-up since the /tmp and/or the > > /var/tmp where n

Re: Security features of Debian Etch?

2007-05-28 Thread Russell Coker
On Sunday 27 May 2007 10:49, Németh Tamás <[EMAIL PROTECTED]> wrote: > Does Debin Etch have some extra chroot > restrictions, /dev/mem, /dev/kmem, /dev/port, /proc//stat, > /proc/maps, Linux privileged I/O related or other security > enhancements beyond to the security of the vanilla Linux kernel?

Re: Encrypting drive

2007-07-09 Thread Russell Coker
On Monday 02 July 2007 11:35, Anders Breindahl <[EMAIL PROTECTED]> wrote: > In servers, you might want to trust physical security, since > whole-system encryption incurs a performance degradation. (However, on a > reasonably recent system, you still will be bottlenecked by Fast > Ethernet at 100Mb/

Re: Encrypting drive

2007-07-09 Thread Russell Coker
On Monday 09 July 2007 22:23, Anders Breindahl <[EMAIL PROTECTED]> wrote: > > Where "reasonably fast" means faster than a 3GHz P4. A 3GHz P4 system I > > was working on recently appeared to be limited to 4MB/s, if it wasn't for > > the fact that the machine is about to be decommissioned then I wou

Re: [SECURITY] [DSA 3148-1] chromium-browser end of life

2015-02-01 Thread Russell Coker
On Sun, 1 Feb 2015 11:18:43 PM Paul Wise wrote: > chromium was already being backported to wheezy for security updates, > the latest versions need newer compilers so we can't backport any > more. Why can't we backport the compilers too? -- To UNSUBSCRIBE, email to debian-security-requ...@lists.

Re: SELinux in Jessie??

2015-09-12 Thread Russell Coker
On Mon, 4 May 2015, Paul Wise wrote: > On Mon, May 4, 2015 at 12:20 AM, Bart-Jan Vrielink wrote: > > Where can I find a suitable policy? The package selinux-policy-default is > > no longer available, and I cannot find a suitable replacement in > > Jessie/main. > > The package was removed before j

Re: Security features in the upcoming release (Stretch)

2016-09-27 Thread Russell Coker
My plan is to have the KDE and GNOME desktop environments working with SE Linux enforcing mode on Stretch along with the most important apps such as Google Chrome/Chromium. I hope to have something ready to test in Unstable in a few weeks. On 23 September 2016 11:21:55 pm AEST, "m.la...@t-onlin

Re: Some Debian package upgrades are corrupting rsync "quick check" backups

2017-01-30 Thread Russell Coker
On Sunday, 29 January 2017 8:07:09 PM AEDT Santiago Vila wrote: > IMO, if we want reproducible builds and we don't want this to happen, > we should probably change the way we do binNMUs (where "change" could > well be not doing binNMUs at all and always include full and exact > source with every up

Re: Iptables

2017-03-31 Thread Russell Coker
On Fri, 31 Mar 2017 09:44:01 PM R Calleja wrote: > can anybody help me. I have security issues and I have to reinstall > the system every year. > Set up a firewall with iptables as the attachment and now block > connections as you can see in the dmesg attachment. Debian-user is probably a better l

Re: HTTPS enabled Debian Security repository

2017-10-30 Thread Russell Coker
On Monday, 30 October 2017 8:57:00 AM AEDT Hans-Christoph Steiner wrote: > > The one from 2016 is harder to exploit: I asked on #-apt back then and > > the sample exploit had a 1/4 success change with a 1.3 GB InRelease file > > on a memory starved i386 system). > > That hit rate is enough to buil

Re: make-pgp-clean-room suggestions / patches

2017-11-04 Thread Russell Coker
On Saturday, 4 November 2017 7:36:02 PM AEDT Rebecca N. Palmer wrote: > Background: my sponsor suggested that I apply for DM over a year ago, > and the reason I haven't done so is that I'm not sure my security is up > to it, given that anyone who hacks a DM can upload a Trojan. I only own > one co

Intel Microcode updates

2019-06-09 Thread Russell Coker
I just discovered the spectre-meltdown-checker package (thanks Sylvestre for packaging this). model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz On a system with the above CPU running Debian/Testing I get the following results from the spectre-meltdown-checker script. Is this a

Re: Intel Microcode updates

2019-06-11 Thread Russell Coker
On Tuesday, 11 June 2019 12:19:14 PM AEST Henrique de Moraes Holschuh wrote: > On Mon, 10 Jun 2019, Russell Coker wrote: > > model name : Intel(R) Core(TM)2 Quad CPUQ9505 @ 2.83GHz > > > > On a system with the above CPU running Debian/Testing I get the following

Re: Intel Microcode updates

2019-06-11 Thread Russell Coker
On Monday, 10 June 2019 9:16:02 PM AEST Michael Stone wrote: > Your CPU is not supported my Intel, so you either accept the risk or buy > a new one. (Note that the latest version of the microcode is from > 2015--long before any of these speculative execution vulnerabilities > were mitigated.) Yours

package for security advice

2020-03-07 Thread Russell Coker
I think it would be good to have a package for improving system security. It could depend on packages like spectre-meltdown-checker and also contain scripts that look for ways of improving system security. For example recommend SE Linux or Apparmor (if you don't have one installed), recommend

Re: package for security advice

2020-03-07 Thread Russell Coker
On Saturday, 7 March 2020 11:39:05 PM AEDT vi...@vheuser.com wrote: > Isn't this what Tiger does? > > apt-cache search tiger > > tiger - Report system security vulnerabilities > tiger-otheros - Scripts to run Tiger in other operating systems Tiger is something that the tool I'm proposing could s

Re: How efficient is mounting /usr ro?

2003-10-16 Thread Russell Coker
On Fri, 17 Oct 2003 07:08, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > A read-only /usr is not a security measure. > > Depends on your definition og it-security. It reduces downtime, prevents > some admin and software failures and therefore is a security measure. So is a

Re: How efficient is mounting /usr ro?

2003-10-17 Thread Russell Coker
On Sat, 18 Oct 2003 07:07, Adam ENDRODI wrote: > To stay on topic, I'm for keeping /usr and /usr/local read-only, > because really nothing should update them except for a few > programs under controlled circumstances (that's what makes > the enforcment of this policy cheap).  In addition, it might

Re: How efficient is mounting /usr ro?

2003-10-18 Thread Russell Coker
On Sat, 18 Oct 2003 23:36, Goswin von Brederlow wrote: > Michael Stone <[EMAIL PROTECTED]> writes: > > A quiescent filesystem isn't going to be corrupted in a system crash. > > You need to have metadata inconsistencies caused by filesystem activity > > before you can get corruption. > > Which you g

Re: How efficient is mounting /usr ro?

2003-10-18 Thread Russell Coker
On Sun, 19 Oct 2003 03:44, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > Anyway perhaps we should get a new mailing list debian-security-de for > > the German meaning of security. Then the rest of us can discuss crypto, > > MAC, and other things that match the English mean

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 18:50, Tobias Reckhard wrote: > > also su user -c command won't work, you'll need to use sudo or suid bit, > > and that's a bit messy. > > This is true, when I need to su to this user's account (for > troubleshooting, usually), I need to 'chsh -s /bin/bash mirror' first > (and c

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 19:27, Dariush Pietrzak wrote: > > 'su -s /bin/bash -c "cmd" user ' > > > > sounds like a very bs argument > >  Do you understand the term 'breakage' ? Do you understand the term "testing"? > How about the idea that changing something in the system may force to you > to rewrit

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 20:00, Dariush Pietrzak wrote: > > >  Do you understand the term 'breakage' ? > > > > Do you understand the term "testing"? > > Why should I? Because some of us have already performed extensive tests on this when it was raised previously. The idea of giving non-login account

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 21:37, I.R.van Dongen wrote: > > > If the shells are changed, there are some really big consequences, > > > but > > > > Such as? Please share your knowledge. :-) > > - manually compiled postgresql (user:postgres) expects the user it runs > as to have a valid shell (I'm not sure

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 20:39, Joe Moore wrote: > Russell Coker said: > > The idea of giving non-login accounts a shell of /bin/false is hardly > > new. > > Out of curiosity, what security benefit does a shell of /bin/false grant, > that say, an encrypted password of &q

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Thu, 23 Oct 2003 04:02, Joe Moore wrote: > > There was a case of a buggy pam some time ago which let people login to > > accounts such as "man" and "bin". Changing the shell would have > > prevented that problem (or limited the number of accounts that were > > vulnerable) > > So there was a b

Re: Securetty: limits root login while allowing 'su -'

2003-10-23 Thread Russell Coker
On Fri, 24 Oct 2003 10:50, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > I discovered I could 'su -' to root in the excluded ttys. Do you think > > this is normal behaviour or does my system need re-configuration ? > > This is the intended normal behaviour. Idea behind it

Re: Why do system users have valid shells

2003-10-24 Thread Russell Coker
On Sat, 25 Oct 2003 02:40, Joe Moore wrote: > >> So there was a bug in the PAM code so that it ignored an invalid > >> /etc/passwd field. Why would the next bug not ignore some other > >> /etc/passwd field (like the user's chosen shell)? > > > > You are correct, the next time a problem is discover

Re: Why do system users have non-empty $HOME? (was Re: Why do system users have valid shells)

2003-10-24 Thread Russell Coker
On Sat, 25 Oct 2003 02:46, Joe Moore wrote: > > To create a file in /bin you need root access. Therefore to create > > /bin/.rhosts you need more access than such a file will grant. There > > is no point in such an attack. Why would someone create /bin/.rhosts > > when they can create /root/.r

Re: group video access hazards?

2003-10-28 Thread Russell Coker
On Tue, 28 Oct 2003 18:12, Tom Goulet (UID0) wrote: > I'm curious what a malicious user could do with access to the > framebuffer device via the device file. Could a malicious > user see anything other than what's on his or her virtual console or X > session? A malicious user who logs in via ssh

Re: How efficient is mounting /usr ro?

2003-11-25 Thread Russell Coker
On Tue, 25 Nov 2003 19:51, Chema <[EMAIL PROTECTED]> wrote: > Making /usr read-only is not for that kind of security. It will keep your > data safe from corruption (soft one, anyway: a disk crash will take > anything with it ;-). Besides, you can get a better performance formating > it with ext2,

Re: How efficient is mounting /usr ro?

2003-11-25 Thread Russell Coker
On Wed, 26 Nov 2003 07:45, Chema <[EMAIL PROTECTED]> wrote: > RC> Why would you get better performance? If you mount noatime then > RC> there's no writes to a file system that is accessed in a read-only > RC> fashion and there should not be any performance issue. > > Hum, ¿are you talking only abo

Re: More hacked servers?

2003-11-26 Thread Russell Coker
On Thu, 27 Nov 2003 04:51, Matt Zimmerman <[EMAIL PROTECTED]> wrote: > Big money does not imply big security.  Large corporations with lots of > money to spend on security are compromised all the time.  Obviously, they > aren't as forthcoming about it as Debian due to monetary concerns, but even >

Re: How efficient is mounting /usr ro?

2003-11-27 Thread Russell Coker
On Wed, 26 Nov 2003 14:24, Bernd Eckenfels <[EMAIL PROTECTED]> wrote: > > I am talking about any file system. When only reading from a file system > > there should not be any performance difference when comparing a RO mount > > vs a NOATIME mount. If there is a difference then it's a bug in the

Re: getting started with SELinux

2003-11-28 Thread Russell Coker
hat can be found on http://www.coker.com.au/uml/ . Feel free to ask me if you have any queries about how to do this properly. Russell Coker [EMAIL PROTECTED]

Re: getting started with SELinux

2003-11-28 Thread Russell Coker
On Sat, 29 Nov 2003 05:10, "Martin G.H. Minkler" <[EMAIL PROTECTED]> wrote: > A little OT, but http://www.adamantix.org 's distro provides everything > and more SELinux has to offer while IMHO being a little easier to handle. Adamantix is not Debian. The people subscribed to this list are here fo

Re: getting started with SELinux

2003-11-29 Thread Russell Coker
On Sat, 29 Nov 2003 11:46, Forrest L Norvell <[EMAIL PROTECTED]> wrote: > > > un libselinux-dev(no description > > > available) ii libselinux1 1.2-1.1 SELinux > > > shared libraries un libselinux1-dev (no > > > description ava

Re: Security patches

2003-11-29 Thread Russell Coker
On Sat, 29 Nov 2003 20:05, Martin Pitt <[EMAIL PROTECTED]> wrote: > > Conflicts with almost every other kernel patch, including the patches in > > the default kernel source. No-one has the skill and interest necessary > > to make it work with a default Debian kernel. > > It may be the hardest thin

Re: Security patches

2003-11-29 Thread Russell Coker
On Sun, 30 Nov 2003 14:53, Colin Walters <[EMAIL PROTECTED]> wrote: > On Sat, 2003-11-29 at 22:47, David Spreen wrote: > > of their programs. the system could use a db of installed-package > > resources. Therefore we would need to create a common language that > > could be translated to any acl-for

Re: Security patches

2003-11-29 Thread Russell Coker
On Sun, 30 Nov 2003 15:32, Colin Walters <[EMAIL PROTECTED]> wrote: > However, this is not such a bad idea, if you don't try to be too formal > about it. If maintainers shipped English descriptions (say, > README.Security) of what the security implications of their programs > were, it could be ver

Re: Security patches

2003-11-30 Thread Russell Coker
On Sun, 30 Nov 2003 22:33, Martin Pitt <[EMAIL PROTECTED]> wrote: > On 2003-11-29 21:08 +1100, Russell Coker wrote: > > It's not a question of how difficult it is to get the grsec patch to > > apply and work correctly on a Debian kernel. It's a question of whether

Re: LSM-based systems and debian packages

2003-11-30 Thread Russell Coker
On Mon, 1 Dec 2003 04:27, Andreas Barth <[EMAIL PROTECTED]> wrote: > Is it possible for me as a package maintainer to specifiy the needed > rights for "my" programms in a way that as much systems as possible > can use these without the need for a sysadmin to change anything? Or > would each LSM-bas

Re: Security patches

2003-11-30 Thread Russell Coker
On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell Coker wrote: > > It's a pity that the developers of other security systems didn't get > > involved, it would be good to have a choice

Re: LSM-based systems and debian packages

2003-11-30 Thread Russell Coker
On Mon, 1 Dec 2003 07:43, Andreas Barth <[EMAIL PROTECTED]> wrote: > > There will be support in RPM for packages that contain SE Linux policy. > > For Debian such support will come later (if at all) as the plan is to > > centrally manage all policy for free software, and it's not difficult to > >

Re: Security patches

2003-11-30 Thread Russell Coker
On Mon, 1 Dec 2003 07:46, Andreas Barth <[EMAIL PROTECTED]> wrote: > * Russell Coker ([EMAIL PROTECTED]) [031130 21:40]: > > On Mon, 1 Dec 2003 05:10, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > > > On Sun, Nov 30, 2003 at 11:24:43PM +1100, Russell C

Re: LSM-based systems and debian packages

2003-12-01 Thread Russell Coker
On Tue, 2 Dec 2003 08:48, Andreas Barth <[EMAIL PROTECTED]> wrote: > * Russell Coker ([EMAIL PROTECTED]) [031201 05:10]: > > On Mon, 1 Dec 2003 07:43, Andreas Barth <[EMAIL PROTECTED]> wrote: > > > What about the gettys? I'm asking this because I wrote the init

Re: LSM-based systems and debian packages

2003-12-02 Thread Russell Coker
On Tue, 2 Dec 2003 18:32, Peter Palfrader <[EMAIL PROTECTED]> wrote: > > There is currently no uucp policy (it seems that no SE Linux users are > > using it). > > I have one, but it does only allow what I need for uucp, which is > certainly just a small subset of possible uucp uses. I've attached

Re: LSM-based systems and debian packages

2003-12-02 Thread Russell Coker
On Wed, 3 Dec 2003 00:56, Peter Palfrader <[EMAIL PROTECTED]> wrote: > > I've attached a modified version, please check it out. I've changed some > > of the things to do it in the recommended manner (eg the > > system_crond_entry() macro), and removed some things. > > > > The part for running ssh

Re: secure file permissions

2003-12-08 Thread Russell Coker
On Mon, 8 Dec 2003 19:16, "Domonkos Czinke" <[EMAIL PROTECTED]> wrote: > I recommend using the chattr program. You should set them immutable > chattr +i /etc/passwd /etc/shadow /etc/group /etc/gshadow. Man chattr. In a stock Linux kernel the permissions required to "chattr -i" a file are exactly

Re: Security patches

2003-12-18 Thread Russell Coker
On Fri, 19 Dec 2003 08:02, martin f krafft <[EMAIL PROTECTED]> wrote: > I would be very interested, Russel, to hear your opinion about the > claim that the LSM hooks are dangerous in terms of root kit > exploits. Do you agree? If not, then please tell us what LSM > precautions take care to prevent

Re: Security patches

2003-12-19 Thread Russell Coker
On Fri, 19 Dec 2003 20:18, Henrique de Moraes Holschuh <[EMAIL PROTECTED]> wrote: > On Fri, 19 Dec 2003, Russell Coker wrote: > > In terms of LSM protection against this, if you use SE Linux then all > > aspects of file access and module loading are controlled by the polic

Re: GnuPG & mutt on Woody 3.0r2.

2003-12-22 Thread Russell Coker
On Mon, 22 Dec 2003 19:45, Marcel Weber <[EMAIL PROTECTED]> wrote: > s. keeling wrote: > > gpg: Signature made Sun Dec 21 17:14:28 2003 MST using DSA key ID > > 946886AE gpg: Good signature from "Trey Sizemore <[EMAIL PROTECTED]>" > > gpg: WARNING: This key is not certified with a trusted signature

Re: GnuPG & mutt on Woody 3.0r2.

2003-12-22 Thread Russell Coker
On Mon, 22 Dec 2003 20:02, Marcel Weber <[EMAIL PROTECTED]> wrote: > Russell Coker wrote: > > Signing a key you don't know is not a good idea, it's easy to > > accidentally upload a key... > > > > There is a gpg option "lsign" which can be us

Re: Attempts to poison bayesian systems

2003-12-23 Thread Russell Coker
This discussion has some minor relevance to debian-isp, but nothing to do with debian-security. Let's move the discussion to debian-isp. On Wed, 24 Dec 2003 00:25, Dale Amon <[EMAIL PROTECTED]> wrote: > I've been noticing loads of mails like this lately: > > emery atrocious larval drippy elate

Re: Security patches

2004-01-03 Thread Russell Coker
On Sun, 4 Jan 2004 07:53, martin f krafft <[EMAIL PROTECTED]> wrote: > also sprach Russell Coker <[EMAIL PROTECTED]> [2003.12.19.0229 +0100]: > > In terms of LSM protection against this, if you use SE Linux then > > all aspects of file access and module loading are contr

Re: strange apache error.log entry

2004-01-20 Thread Russell Coker
On Wed, 21 Jan 2004 11:28, Markus Schabel <[EMAIL PROTECTED]> wrote: > hello folks! > > can you tell me what the following means in an apache error.log and > where it comes from? I've searched through all other apache log files > but didn't find something that could generate this. > (sure, the serv

Re: Mail processing tool

2004-01-25 Thread Russell Coker
On Sun, 25 Jan 2004 20:49, "Raffaele D'Elia" <[EMAIL PROTECTED]> wrote: > checks for new mail in a maibox via pop3; If you use IMAP it should be possible for you to ask the server to notify you when new mail is received. This should give you a faster response if the server correctly implements

Re: How to tell what process accessed a file

2004-02-14 Thread Russell Coker
On Sun, 15 Feb 2004 05:31, Wade Richards <[EMAIL PROTECTED]> wrote: > Every once in a while I get a bunch of errors because some process tried > to access my CDROM, triggering automount when there's no disk in the > drive. SE Linux can audit all interesting actions, exec, read, write, create, sig

Re: Help! File permissions keep changing...

2004-02-18 Thread Russell Coker
On Wed, 18 Feb 2004 23:30, Kristopher Matthews <[EMAIL PROTECTED]> wrote: > > This is a security nightmare. I would *not* recommend doing any such > > thing in a user filesystem. > > You're making the assumption that he LIKES his users. :) It's not a matter of whether the admin likes his users, it

Re: Help! File permissions keep changing...

2004-02-18 Thread Russell Coker
On Wed, 18 Feb 2004 23:59, Javier Fernández-Sanguino Peña <[EMAIL PROTECTED]> wrote: > On Wed, Feb 18, 2004 at 11:05:30AM +0100, Richard Atterer wrote: > > Waah, SCARY! > > > > Users can create hard links to arbitrary files in that directory, e.g. > > links to other users' private files or to

Re: Help! File permissions keep changing...

2004-02-18 Thread Russell Coker
On Thu, 19 Feb 2004 00:23, Javier Fernández-Sanguino Peña <[EMAIL PROTECTED]> wrote: > On Wed, Feb 18, 2004 at 11:50:27PM +1100, Russell Coker wrote: > > If you are going to change such things then you need to use the -uid or > > -gid options to find (depending on whether you

Re: Help! File permissions keep changing...

2004-02-19 Thread Russell Coker
On Thu, 19 Feb 2004 09:12, Michael Stone <[EMAIL PROTECTED]> wrote: > On Wed, Feb 18, 2004 at 11:50:27PM +1100, Russell Coker wrote: > >The other way of doing it properly is to write a program that open's each > >file, calls fstat() to check the UID/GID, then uses fchow

Re: Backporting SELinux to woody

2004-03-09 Thread Russell Coker
On Wed, 10 Mar 2004 08:58, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > [ Sorry, I'm not sure if this list is right place to ask this, but > I can't remember better one ] The NSA mailing list is another option, but this one is OK. > I'm trying to backport SELinux tools and libraries from unst

Re: Backporting SELinux to woody

2004-03-10 Thread Russell Coker
On Wed, 10 Mar 2004 21:26, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > > There have been some changes to the way libxattr works. From memory I > > think that you needed an extra -l option on the link command line when > > compiling with old libc6. I can't remember whether it was linking the >

Re: Backporting SELinux to woody

2004-03-10 Thread Russell Coker
On Thu, 11 Mar 2004 08:22, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > On Wed, Mar 10, 2004 at 01:29:16PM +0100, Milan P. Stanic wrote: > > That is. I just rebuilt policycoreutils and pam with libselinux1 > > which is linked with libattr and it was smooth. > > Now I have to backport coreutils an

Re: Backporting SELinux to woody

2004-03-11 Thread Russell Coker
On Thu, 11 Mar 2004 20:40, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > On Thu, Mar 11, 2004 at 09:02:50AM +1100, Russell Coker wrote: > > > If someone needs them I can put it on the net or post somewhere, or > > > maybe help if the help is needed.

Re: Backporting SELinux to woody

2004-03-11 Thread Russell Coker
On Thu, 11 Mar 2004 22:14, "Milan P. Stanic" <[EMAIL PROTECTED]> wrote: > On Thu, Mar 11, 2004 at 09:42:52PM +1100, Russell Coker wrote: > > If you copy all files related to a package intact then you don't have to > > make such changes. > > > > I

Re: Backporting SELinux to woody

2004-03-12 Thread Russell Coker
On Fri, 12 Mar 2004 06:25, Norbert Tretkowski <[EMAIL PROTECTED]> wrote: > * Milan P. Stanic wrote: > > Can I put in version something like libselinux1_1.6-0.1-bp.mps_i386.deb > > instead of libselinux1_1.6-0.1_i386.deb? > > Well, if 1.6-0.1 will be in our next stable release, your backport > will

Re: kernel 2.4.22 patch

2004-03-19 Thread Russell Coker
On Sat, 20 Mar 2004 05:14, Phillip Hofmeister <[EMAIL PROTECTED]> wrote: > On another note, The GRSecurity/SELinux patches mitigate a lot of kernel > vulnerabilities and userland vulnerabilities.  If you are running your > own kernel you may wish to look at them. Nothing protects you against kerne

Cron - was Known vulnerabilities left open in Debian?

2004-03-23 Thread Russell Coker
On Tue, 23 Mar 2004 08:19, Florian Weimer <[EMAIL PROTECTED]> wrote: > No, it's another example for a package which heavily deviates from > upstream (AFAIK, upstream is defunct) and is now developed by the > GNU/Linux distributions (and each variant has a slightly different > features).  Despite th

Re: name based virtual host and apache-ssl

2004-03-24 Thread Russell Coker
On Wed, 24 Mar 2004 22:22, Michael Stone <[EMAIL PROTECTED]> wrote: > The best you could do would be to attach different certificates to > different ports, but that would be extremely cumbersome and probably > would lead to confusion. What if you had http://www.company1.com/ redirect to https://w

Re: VPN Firewall Kernel

2004-04-10 Thread Russell Coker
On Thu, 1 Apr 2004 17:59, [EMAIL PROTECTED] (Michael Becker) wrote: > If you just want a kernel, with almost everything in there belonging > to security, have a look at WOLK (Working OverLoaded Kernel) > at http://sourceforge.net/projects/wolk It appears that WOLK is not in Debian. I would guess

Re: passwords changed?

2004-04-10 Thread Russell Coker
On Sat, 10 Apr 2004 04:22, [EMAIL PROTECTED] wrote: > Is there anything ordinary that can cause passwords to be changed? I tried > to log in last night and sshd wouldn't accept either my user's password or > my root password. When I got physical access this morning, I couldn't log > into the consol

Re: Server slowdown...

2004-04-12 Thread Russell Coker
On Mon, 12 Apr 2004 10:00, Joe Bouchard <[EMAIL PROTECTED]> wrote: > In a meeting at work (I'm part of the IT group at a large corporation) > someone mentioned a particular kind of network hardware which would stop > working correctly after a while. Here are some ways that network issues can slow

Re: How efficient is mounting /usr ro?

2003-10-16 Thread Russell Coker
On Fri, 17 Oct 2003 07:08, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > A read-only /usr is not a security measure. > > Depends on your definition og it-security. It reduces downtime, prevents > some admin and software failures and therefore is a security measure. So is a

Re: How efficient is mounting /usr ro?

2003-10-17 Thread Russell Coker
On Sat, 18 Oct 2003 07:07, Adam ENDRODI wrote: > To stay on topic, I'm for keeping /usr and /usr/local read-only, > because really nothing should update them except for a few > programs under controlled circumstances (that's what makes > the enforcment of this policy cheap).  In addition, it might

Re: How efficient is mounting /usr ro?

2003-10-18 Thread Russell Coker
On Sat, 18 Oct 2003 23:36, Goswin von Brederlow wrote: > Michael Stone <[EMAIL PROTECTED]> writes: > > A quiescent filesystem isn't going to be corrupted in a system crash. > > You need to have metadata inconsistencies caused by filesystem activity > > before you can get corruption. > > Which you g

Re: How efficient is mounting /usr ro?

2003-10-18 Thread Russell Coker
On Sun, 19 Oct 2003 03:44, Bernd Eckenfels wrote: > In article <[EMAIL PROTECTED]> you wrote: > > Anyway perhaps we should get a new mailing list debian-security-de for > > the German meaning of security. Then the rest of us can discuss crypto, > > MAC, and other things that match the English mean

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 18:50, Tobias Reckhard wrote: > > also su user -c command won't work, you'll need to use sudo or suid bit, > > and that's a bit messy. > > This is true, when I need to su to this user's account (for > troubleshooting, usually), I need to 'chsh -s /bin/bash mirror' first > (and c

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 19:27, Dariush Pietrzak wrote: > > 'su -s /bin/bash -c "cmd" user ' > > > > sounds like a very bs argument > >  Do you understand the term 'breakage' ? Do you understand the term "testing"? > How about the idea that changing something in the system may force to you > to rewrit

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 20:00, Dariush Pietrzak wrote: > > >  Do you understand the term 'breakage' ? > > > > Do you understand the term "testing"? > > Why should I? Because some of us have already performed extensive tests on this when it was raised previously. The idea of giving non-login account

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 21:37, I.R.van Dongen wrote: > > > If the shells are changed, there are some really big consequences, > > > but > > > > Such as? Please share your knowledge. :-) > > - manually compiled postgresql (user:postgres) expects the user it runs > as to have a valid shell (I'm not sure

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Wed, 22 Oct 2003 20:39, Joe Moore wrote: > Russell Coker said: > > The idea of giving non-login accounts a shell of /bin/false is hardly > > new. > > Out of curiosity, what security benefit does a shell of /bin/false grant, > that say, an encrypted password of &q

Re: Why do system users have valid shells

2003-10-22 Thread Russell Coker
On Thu, 23 Oct 2003 04:02, Joe Moore wrote: > > There was a case of a buggy pam some time ago which let people login to > > accounts such as "man" and "bin". Changing the shell would have > > prevented that problem (or limited the number of accounts that were > > vulnerable) > > So there was a b

  1   2   3   >