On 26.06.09 10:35, Jesus arteche wrote:
> I'm working with proftpd, it works right, the users make login and access to
> the directories with the right permmission, but when they access to their
> directoris they can also see the others directories from other users. How
> can i do to make them just
On Fri,26.Jun.09, 10:35:25, Jesus arteche wrote:
> Hello,
>
> I'm working with proftpd, it works right, the users make login and access to
> the directories with the right permmission, but when they access to their
> directoris they can also see the others directories from other
> users.
And how
On 10/5/06, Jason Dunsmore <[EMAIL PROTECTED]> wrote:
On two different occasions over the past month, text from the console
was sent to the printer. It prints 3-4 copies of 2-3 pages from the
console. The text is printed out just like it's shown in the console,
with both the commands and their
On 2006-10-05 17:58:54 -0700, Jason Dunsmore wrote:
> I'm running the latest Etch with 2.6.16-2-686-smp. This is a pretty
> big security problem, since my computer prints to a shared printer.
> Any idea what's causing it?
Perhaps escape sequences sent to the terminal? I had this problem
in the pa
On 10/6/06, Lubos Vrbka <[EMAIL PROTECTED]> wrote:
Mumia W.. wrote:
> There is no way to disable the special input modes. That's why Debian
> provides both rxvt-xpm (rxvt) and urxvt (rxvt-unicode).
ok, good to know... maybe i should return back to uxterm :)
> BTW, I can input accented characters
Mumia W.. wrote:
There is no way to disable the special input modes. That's why Debian
provides both rxvt-xpm (rxvt) and urxvt (rxvt-unicode).
ok, good to know... maybe i should return back to uxterm :)
BTW, I can input accented characters in rxvt using my Multi_key
(Compose). I used xmodmap t
On 10/06/2006 12:00 AM, Lubos Vrbka wrote:
Mumia W.. wrote:
Hit Control-Shift, and urxvt (rxvt-unicode) goes into Unicode digit
acquisition mode. Release Control, and it goes into "keycap insertion
mode." Jason, perhaps some keys you press in one of those modes cause
^P or something similar to
On 10/5/06, Mumia W.. <[EMAIL PROTECTED]> wrote:
On 10/05/2006 09:34 PM, Lubos Vrbka wrote:
>>> On two different occasions over the past month, text from the console
>>> was sent to the printer. It prints 3-4 copies of 2-3 pages from the
>>> console. The text is printed out just like it's shown
Mumia W.. wrote:
Hit Control-Shift, and urxvt (rxvt-unicode) goes into Unicode digit
acquisition mode. Release Control, and it goes into "keycap insertion
mode." Jason, perhaps some keys you press in one of those modes cause ^P
or something similar to be generated.
I use rxvt-xpm nowadays bec
On 10/05/2006 09:34 PM, Lubos Vrbka wrote:
On two different occasions over the past month, text from the console
was sent to the printer. It prints 3-4 copies of 2-3 pages from the
console. The text is printed out just like it's shown in the console,
with both the commands and their output.
I
On two different occasions over the past month, text from the console
was sent to the printer. It prints 3-4 copies of 2-3 pages from the
console. The text is printed out just like it's shown in the console,
with both the commands and their output.
I use urxvt as my X console, and I run several
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/05/06 19:58, Jason Dunsmore wrote:
> On two different occasions over the past month, text from the console
> was sent to the printer. It prints 3-4 copies of 2-3 pages from the
> console. The text is printed out just like it's shown in the cons
At 1154265102 past the epoch, Paul van der Vlis wrote:
> The bug is found at Jun 11. Steve Langasek (maintainer of
> libfreetype6) makes patches, the last at Jul 07. Martin
> Schulze sees some problems in it at Jul 23.
>
> Normally the security-team works fast
Jul 23 was only a week ago! Th
Marc Wilson schreef:
> On Fri, Jul 28, 2006 at 11:24:29AM +0200, Paul van der Vlis wrote:
>
>>At 2006/06/10 a security-update of libfreetype6 was publiced what
>>generates a big problem in OpenOffice. See:
>>http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=372719
>
> Yep, lots of discussion there
On Fri, Jul 28, 2006 at 11:24:29AM +0200, Paul van der Vlis wrote:
> At 2006/06/10 a security-update of libfreetype6 was publiced what
> generates a big problem in OpenOffice. See:
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=372719
Yep, lots of discussion there, obviously being actively wor
Vineet Kumar wrote:
> [...]
> Well, there's a clue about why it's not working the way you expect: bash
> enters restricted mode when invoked as 'rbash', but it's being invoked
> as '-rbash' from login.
I hadn't noticed that the first time around. I'm digging through the
bash manpage, and the de
* Bob George ([EMAIL PROTECTED]) [020926 11:40]:
> I'm using bash on Debian 'testing'. I've created a symlink /bin/rbash
> that points to /bin/bash, and prior to upgrading to 3, it worked as
> expected. Users could not do "cd .." and other restricted functions as
> described in the manpage. I o
On Tuesday, October 27, Lukas Eppler wrote
>
> I have [dists/hamm/main dists/hamm/contrib dists/hamm/non-free] in my
> selection in dselect. is there a directory to mention to have the security
> updates quicker than a week, without going slink/unstable?
The best thing to do is to subscribe to de
"J.H.M. Dassen (Ray)" wrote:
> On Tue, Oct 27, 1998 at 09:27:55AM -0500, Peter S Galbraith wrote:
> > I thought that 2.0 was _stable_, and therefore was the same as my CD.
> >
> > This is not the case?
>
> Proposed security fixes (from proposed-updates) are moved into the stable
> tree at the
On Tue, Oct 27, 1998 at 09:27:55AM -0500, Peter S Galbraith wrote:
> I thought that 2.0 was _stable_, and therefore was the same as my CD.
>
> This is not the case?
Proposed security fixes (from proposed-updates) are moved into the stable tree
at the request of the security team.
Ray
--
ART A
On Mon, 26 Oct 1998, Christian Hudon wrote:
> ...
> Well, you can also subscribe to debian-security-announce@lists.debian.org
> Information about every security fix released by Debian is posted there.
> (To subscribe, send an email to
> [EMAIL PROTECTED] with the single word
> 'subscribe' in the su
King Lee wrote:
> The fixes appear in the current distributions
> (2.0.2 I think) not in package-updates.
Now I'm really confused. I always thought that I'd have everything by
installing 2.0 and then tracking proposed-updates.
I thought that 2.0 was _stable_, and therefor
> > > The bug is real, and Debian has a fix. See security
> > > lists in Debian. If you are running Debian 2.0
> > > you might have a security hole. There was also security
> > > problems with bind. The fixes appear in the current distributions
> > > (2.0.2 I think) not in package-updates.
> >
Sorry to keep this thread going, but perhaps one more clarification.
The original post said that the bug occured on RedHat 5.1 of our
system administrator. I immediately emailed Red Hat
(haven't heard from them yet), and also posted to Debian.
I got a reply from Debian within 12 hours and look
On Fri, 23 Oct 1998, King Lee wrote:
> The bug is real, and Debian has a fix. See security
> lists in Debian. If you are running Debian 2.0
> you might have a security hole. There was also security
> problems with bind. The fixes appear in the current distributions
> (2.0.2 I think) not in pa
My message was not clear.
We did not mount /etc writable. The hacker sent a a long packet
which we think overflowed buffer and caused /etc to be mounted
writable.
The bug is real, and Debian has a fix. See security
lists in Debian. If you are running Debian 2.0
you might have a securi
> At our school our system administrator (who is very good) was
> running Red Hat 5.1 and someone broke in and got root privileges.
> Since he had written a Lan watch, we think we know how it happened.
>
> The Lan Watch showed someone form Israel send a very long
> packet to mountd. Shortly afte
On Thu, 22 Oct 1998, King Lee wrote:
: Hello,
:
: At our school our system administrator (who is very good) was
: running Red Hat 5.1 and someone broke in and got root privileges.
: Since he had written a Lan watch, we think we know how it happened.
:
: The Lan Watch showed someone form I
Carey Evans <[EMAIL PROTECTED]> writes:
> Frank Barknecht <[EMAIL PROTECTED]> writes:
>
> > How do I "forward pop3 over ssh"?
>
> This is described in question C4 in the fetchmail FAQ (at least for
> version 4.3.6). Basically you need to install ssh on the client and
> sshd on the mail server
Frank Barknecht <[EMAIL PROTECTED]> writes:
> How do I "forward pop3 over ssh"?
This is described in question C4 in the fetchmail FAQ (at least for
version 4.3.6). Basically you need to install ssh on the client and
sshd on the mail server ("mailhost") and put something like this in
your .fetch
Carey Evans hat gesagt: // Carey Evans wrote:
> Benoit Joly <[EMAIL PROTECTED]> writes:
>
> > i found that everyone on our hubs can get my ftp, and pop3 password so
> > easy with a sniffer.
> > can i do something against that, because now i dont trust tcpip transfert,
> > it send all my user
Benoit Joly <[EMAIL PROTECTED]> writes:
> hi,
> i found that everyone on our hubs can get my ftp, and pop3 password so
> easy with a sniffer.
> can i do something against that, because now i dont trust tcpip transfert,
> it send all my user name and password in ascii code.
> wow!!
I don“t k
On Wed, Feb 25, 1998 at 03:28:26AM -0500, Benoit Joly wrote:
> hi,
> i found that everyone on our hubs can get my ftp, and pop3 password so
> easy with a sniffer.
> can i do something against that, because now i dont trust tcpip transfert,
> it send all my user name and password in ascii code
Benoit Joly <[EMAIL PROTECTED]> writes:
> i found that everyone on our hubs can get my ftp, and pop3 password so
> easy with a sniffer.
> can i do something against that, because now i dont trust tcpip transfert,
> it send all my user name and password in ascii code.
Get ssh from a Debian n
>
> No, I was not running patch as root.
> I've done it a number of times now with the same result !
Well, if that is true, then eighter you've got a setuid
patch (likely, though it means whoever did it should be banned
from ever touching a keyboard again. If you did it, then tough),
or you've r
No, I was not running patch as root.
I've done it a number of times now with the same result !
I have not changed anything with regard to patch
I'll test again today, but I'm sure I'll get the same
results.
Matthew
On Sat, 18 Oct 1997, joost witteveen wrote:
> >
> > I'm not sure if this
>
> I'm not sure if this is suppose to happen, but it sure
> looks serious to me...
>
> While patching some source code I noticed that all the files
> that were patched were now group owned by root !?!
>
> The command I used was:
> patch -p1 < patch.diff
>
> I've done this a few times to check,
37 matches
Mail list logo