Re: SELinux on Squeeze?

2011-12-31 Thread Russell Coker
On Sat, 31 Dec 2011, Laurentiu Pancescu wrote: > effective). I tested Exec-shield in Debian a few years ago, with and > without SELinux, it makes a big difference: I just did a quick test on an i386 system with PAE running a 686 Squeeze kernel. SE Linux enforcing vs permissive made no differen

Re: Bug#605090: Linux 3.2 in wheezy

2012-02-01 Thread Russell Coker
On Thu, 2 Feb 2012, dann frazier wrote: > Whilte it may help the kernel team to not have to worry about problems > in the grsec flavor when preparing uploads, preventing delays for the > non-grsec images. But, that just pushes the coordination down a ways - > for stable updates we would need to ad

Re: Bug#605090: Linux 3.2 in wheezy

2012-02-02 Thread Russell Coker
On Fri, 3 Feb 2012, Christoph Anton Mitterer wrote: > Wasn't it once the case with PaX that packages have to be compiled > specially? Or some ELF headers added or so? Some shared libraries have code which can't be run without an executable stack, it's a small number of libraries that are written

Re: how to fix rootkit?

2012-02-08 Thread Russell Coker
On Thu, 9 Feb 2012, Stephen Hemminger wrote: > The advice I heard is trust nothing (even reflash the BIOS). Do you know of any real-world exploits that involve replacing the BIOS? It's been theoretically possible for a long time but I haven't seen any references to it being done. Also one thi

Re: how to fix rootkit?

2012-02-08 Thread Russell Coker
On Thu, 9 Feb 2012, Jason Fergus wrote: > Out of curiosity, couldn't one technically boot up a liveCD, mount the > drive(s) and then download the .debs individually, then extract them > over the mounted partitions, effectively copying over all of the > binaries. There is the possibility of SUID b

Re: how to fix rootkit?

2012-02-09 Thread Russell Coker
On Thu, 9 Feb 2012, "Milan P. Stanic" wrote: > On Wed, 2012-02-08 at 17:56, Fernando Mercês wrote: > > I think you're talking about syscall interceptions and related stuff. > > You're right, we can't trust, but it in this case we're talking about > > a very specialized malware and I don't see any

Re: OpenSSH not logging denied public keys, even with logging set to verbose.

2012-03-01 Thread Russell Coker
On Fri, 2 Mar 2012, Jordon Bedwell wrote: > > Run the command below. > > > > grep "ssh:1.%.30s@%.128s.s password:" /usr/sbin/sshd; echo $? > > > > If you don't get 1 as output, your sshd is compromised. > > It returned 1, this happens on freshly installed Debian and Ubuntu too > though, tested

Re: OpenSSH not logging denied public keys, even with logging set to verbose.

2012-03-01 Thread Russell Coker
On Fri, 2 Mar 2012, Mike Mestnik wrote: > > I'd like to have OpenSSH log the email address field from a key that was > > used for login so I could see something like "ssh key > > russ...@coker.com.au was used to login to account rjc" in my logs. > > > From what I know that information(the comment

Re: Dedicated server vs. VPS

2012-03-04 Thread Russell Coker
On Mon, 5 Mar 2012, Stayvoid wrote: > Which one is more secure? The one that is run by the most skilled people who devote the most resources to making it secure. But this is nothing to do with the debian-security list. -- My Main Blog http://etbe.coker.com.au/ My Documents Bloghtt

Re: Security Implications of DKMS?

2012-03-27 Thread Russell Coker
On Tue, 27 Mar 2012, David Ehle wrote: > Isn't having compilers/build tools considered a security "no no" if > possible to avoid? There have been some attacks on systems which have relied on the presence of various compilers and interpreters, the best known example is the Morris Worm. But the

Re: About audit2allow generated rules

2012-04-25 Thread Russell Coker
On Thu, 26 Apr 2012, Min Wang wrote: > I have something in /var/log/audit/audit.log like: > > avc: denied { write } for pid=23739 comm="httpd" name="renderd.sock" >dev=dm-0 ino=1183752 scontext=unconfined_u:system_r:httpd_t:s0 >tcontext=unconfined_u:object_r:var_run_t:s0 tclass=s

Re: About audit2allow generated rules

2012-04-26 Thread Russell Coker
On Fri, 27 Apr 2012, Min Wang wrote: > just wondering where is the tclass=sock_file defined? In the refpolicy source it is in policy/flask/access_vectors . >basically i have apache mod_tile want to access > > /var/run/renderd/renderd.sock ( from renderd) > > ls -lZ /var/run/renderd/ >

Re: flashplugin-nonfree get-upstream-version.pl security concern

2012-12-12 Thread Russell Coker
On Thu, 13 Dec 2012, Moritz Mühlenhoff wrote: > Plus, installing Flash opens the Pandora's box anyway When a user runs a web browser that calls the Flash plugin then that user session is exposed to the risk of a compromised Adobe web site etc. When the user visits a potentially hostile web sit

Re: NSA software in Debian

2014-01-21 Thread Russell Coker
On Sun, 19 Jan 2014, Marco Saller wrote: > i am not sure if this question has been asked or answered yet, please do > not mind if i would ask it again. Is it possible that the NSA or other > services included investigative software in some Debian packages? It is possible that a DD has betrayed th

Re: NSA software in Debian

2014-01-28 Thread Russell Coker
On Fri, 24 Jan 2014, Marko Randjelovic wrote: > > I would also like this. Yesterday I started compiling 3.2.54 with grsec > > and PaX. A ready debian kernel(-source) with grsec and PaX would be > > fine. Currently I am distributing my special packages via my own > > repository - is there any conce

Re: Securing bind..

2001-12-30 Thread Russell Coker
On Sun, 30 Dec 2001 11:18, Petre Daniel wrote: > Well,i know Karsten's on my back and all,but i have not much time to > learn,and too many things to do at my firm,so i am asking if one of you has > any idea how can bind be protected against that DoS attack and if someone > has some good firewall f

Re: Securing bind..

2001-12-30 Thread Russell Coker
On Sun, 30 Dec 2001 16:17, Jor-el wrote: > On Sun, 30 Dec 2001, Russell Coker wrote: > > Also don't allow recursion from outside machines. > > Why does this help? When someone sends a recursive query to your server then they know (with a good degree of accuracy) what requ

Re: virtual hosting

2002-03-26 Thread Russell Coker
On Tue, 26 Mar 2002 15:49, Michal Novotny wrote: > It is possible to make virtual web hosting (apache) in chroot jail? Yes. Just install complete copies of Debian in the chroot jails. > There is a little problem with about 1500 domains/clients. > How can I set it up (with perl/php/ssi/ssl/cgi/f

Re: Securing bind..

2001-12-30 Thread Russell Coker
On Sun, 30 Dec 2001 11:18, Petre Daniel wrote: > Well,i know Karsten's on my back and all,but i have not much time to > learn,and too many things to do at my firm,so i am asking if one of you has > any idea how can bind be protected against that DoS attack and if someone > has some good firewall fo

Re: Securing bind..

2001-12-30 Thread Russell Coker
On Sun, 30 Dec 2001 16:17, Jor-el wrote: > On Sun, 30 Dec 2001, Russell Coker wrote: > > Also don't allow recursion from outside machines. > > Why does this help? When someone sends a recursive query to your server then they know (with a good degree of accuracy) what requ

Re: virtual hosting

2002-03-26 Thread Russell Coker
On Tue, 26 Mar 2002 15:49, Michal Novotny wrote: > It is possible to make virtual web hosting (apache) in chroot jail? Yes. Just install complete copies of Debian in the chroot jails. > There is a little problem with about 1500 domains/clients. > How can I set it up (with perl/php/ssi/ssl/cgi/ft

<    1   2   3