Hi.
On Sun, Jul 15, 2018 at 01:02:48PM -0400, Roberto C. Sánchez wrote:
> On Sun, Jul 15, 2018 at 06:07:32PM +0200, Hans wrote:
> > Am Sonntag, 15. Juli 2018, 17:43:47 CEST schrieb Henrique de Moraes
> > Holschuh:
> >
> > Maybe I was not clear enough. I did not mourn,. that packages are
Henrique de Moraes Hols writes:
> Same goes for dist-upgrade. dist-upgrade/full-upgrade will more
> aggressively attempt to remove packages than the alternatives
> safe-upgrade and upgrade.
I always do "upgrade" and look at what did not get upgraded and why. I
then sometimes follow with "full-up
On Sun, Jul 15, 2018 at 06:07:32PM +0200, Hans wrote:
> Am Sonntag, 15. Juli 2018, 17:43:47 CEST schrieb Henrique de Moraes Holschuh:
>
> Maybe I was not clear enough. I did not mourn,. that packages are
> dienstalled,
> this may happen in testing. I mourned,m that almost ALL SECURITY related
>
Am Sonntag, 15. Juli 2018, 17:43:47 CEST schrieb Henrique de Moraes Holschuh:
Maybe I was not clear enough. I did not mourn,. that packages are dienstalled,
this may happen in testing. I mourned,m that almost ALL SECURITY related
packages are deinstalled. And I would have nothing said, if it wou
On Sun, 15 Jul 2018, The Wanderer wrote:
> >> be warned: Wheh you do apt full-upgrade,
> >
> > You're in testing: what are you "full-upgrade"-ing to and why?
>
> To testing, of course.
Eh, I believe the meant that as "why are you using full-upgrade instead
of safe-upgrade or upgrade" (depending
On 2018-07-15 at 10:09, David Wright wrote:
> On Sun 15 Jul 2018 at 07:49:36 (+0200), Hans wrote:
>
>> Hi folks,
>>
>> be warned: Wheh you do apt full-upgrade,
>
> You're in testing: what are you "full-upgrade"-ing to and why?
To testing, of course.
Just because you're running testing doesn't
On Sun 15 Jul 2018 at 07:49:36 (+0200), Hans wrote:
> Hi folks,
>
> be warned: Wheh you do apt full-upgrade,
You're in testing: what are you "full-upgrade"-ing to and why?
> then most security tools, we rely on,
> are deinstallesd. These are rkhunter, chrootkit, autopsy, tripwire,
> needrestar
On 07/15/2018 02:49 PM, Hans wrote:
> be warned: Wheh you do apt full-upgrade, then most security tools, we rely
> on,
> are deinstallesd. These are rkhunter, chrootkit, autopsy, tripwire,
> needrestart and tiger. Also forensics-full and forensics-all are deinstalled
> (however, this might have
Hi folks,
be warned: Wheh you do apt full-upgrade, then most security tools, we rely on,
are deinstallesd. These are rkhunter, chrootkit, autopsy, tripwire,
needrestart and tiger. Also forensics-full and forensics-all are deinstalled
(however, this might have other reasons).
This is no good be
Ah. That might actually work, didn’t know about that snapshot archive. Handy.
I don’t have any server to try it out on now, but I sure will if I get the
chance.
Thanks Brian!
Kind Regards,
David
6 jul 2014 kl. 20:46 skrev Brian :
> On Sun 06 Jul 2014 at 20:35:38 +0200, David Majchrzak, ODERLAND
On Sun 06 Jul 2014 at 20:35:38 +0200, David Majchrzak, ODERLAND Webbhotell AB
wrote:
> Well, the problem with netboot preseed is that it takes a mirror - and
> the official mirrors only have the latest on deb 7 and the latest on
> deb 6 unless I’m mistaken. So even if I try to use a netboot from
gt; resulted in my new SATA drives not being recognized during a Debian
>> 7.5 install.
>>
>> Is there anyway to install 7.5 with my sata card without installing
>> 7.4 from ISO first? I’m using PXE-boot with the netinstall iso and a
>> preseed file.
>>
>>
gt;
> Is there anyway to install 7.5 with my sata card without installing
> 7.4 from ISO first? I’m using PXE-boot with the netinstall iso and a
> preseed file.
>
> The security packages are added AFTER the detection/partitioning of
> disks so I’m unable to detect the drives.
>
-boot with the netinstall iso and a preseed file.
The security packages are added AFTER the detection/partitioning of disks so
I’m unable to detect the drives.
Any idea how to solve it? Is it even possible? I’ve tried modifying the netboot
initrd and add firmware to it, but it seems that during
Pol Hallen wrote:
> I can't everytime do updates from main repository because many packages
> of this server are patched.
How did you patch those? Did you rebuild the package with a local
version string and your changes? Or did you simply wack the files on
the disk?
In any case you should defin
On Tue, 15 Oct 2013 14:14:38 +0200
berenger.mo...@neutralite.org wrote:
> Le 14.10.2013 22:11, Pol Hallen a écrit :
> > I can't everytime do updates from main repository because many
> > packages
> > of this server are patched.
>
> Using pinning for all of your packages is a solution, but I woul
Le 14.10.2013 22:11, Pol Hallen a écrit :
I can't everytime do updates from main repository because many
packages
of this server are patched.
Using pinning for all of your packages is a solution, but I would not
call it the easiest one.
Why not simply freezing them in aptitude/apt-*/dpkg?
F
When you patch a package locally, I'd recommend updating the package version at
the same time by eg adding or incrementing an epoch (in 1:2.3-4, the epoch is
the 1)
This will mean your local package version will be higher than any package
update to the stable repositories.
Note however it woul
On 10/14/2013 10:11 PM, Pol Hallen wrote:
>> I think the best way to do this is using a normal Debian stable. There
>> are only few updates to stable which add features which means that
>> update is a security update.
>
> Huh?
>
> I use debian 7 stable, but now the upgrade show me 4 security upda
> Debian point-release was issued over the weekend:
Understood!
Thanks Steve :-)
Pol
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/525c51c0.4050...@fuckaround.o
> I think the best way to do this is using a normal Debian stable. There
> are only few updates to stable which add features which means that
>update is a security update.
Huh?
I use debian 7 stable, but now the upgrade show me 4 security updates
and MANY MANY updates from debian mirros (not from
On 10/14/2013 09:43 PM, Pol Hallen wrote:
> Howdy :-)
>
> I've a production server particularly patched. I prefer install only
> security packages but keep others packages to same version.
>
> Should I've some problems if keep only:
>
> deb http://securi
Howdy :-)
I've a production server particularly patched. I prefer install only
security packages but keep others packages to same version.
Should I've some problems if keep only:
deb http://security.debian.org/ stable/updates main contrib non-free
to /etc/apt/sources.list
or better
Hi all,
we uploaded preview packages for the next security update of mozilla
applications in debian sarge.
This is the second maintenance release after mozilla developers
officially dropped support for the product versions we ship in sarge.
The packages are based on the patches I backported and a
On Tue, Jun 25, 2002 at 01:02:18PM -0700, nate wrote:
>
> >Has the path to the security packages for potato changed?
> >
> > Failed to fetch
> >
> http://security.debian.org/debian-non-US/dists/potato/non-US/main/binary-i386/Packages>
> 404 Not Found
&
>Hey people.
>
>Has the path to the security packages for potato changed?
>
> Failed to fetch
>
http://security.debian.org/debian-non-US/dists/potato/non-US/main/binary-i386/Packages>
404 Not Found
> Failed to fetch
i think your post is similar to someone else
Hey people.
Has the path to the security packages for potato changed?
Failed to fetch
http://security.debian.org/debian-non-US/dists/potato/non-US/main/binary-i386/Packages
404 Not Found
Failed to fetch
http://security.debian.org/debian-non-US/dists/potato/non-US/contrib/binary-i386
HenSiong Tan wrote:
> Hi!
>
> I was wondering if someone could provide any information
> ("safe" etc) regarding using "dselect" or "apt" to update
> security patches/packages.
>
> For example in a recent announcement, there is a patch
>
> netstd_3.07-2hamm.1_i386.deb
>
> under the direct
Hi all,
I am also confused since I started receiving the security announcements.
Is there a procedure to deal with security updates?
If I install a new Debian system now getting the stable distribution from
ftp, do I have to care about the security announcements from yesterday? In
other words, i
Hi!
I was wondering if someone could provide any information
("safe" etc) regarding using "dselect" or "apt" to update
security patches/packages.
For example in a recent announcement, there is a patch
netstd_3.07-2hamm.1_i386.deb
under the directory /debian/dists/proposed-updates. Now
Ole B Hansen
22-07-97 09:18
Test af svar-agent fra OLH
--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] .
Trouble? e-mail to [EMAIL PROTECTED] .
Ole B Hansen
22-07-97 09:18
Test af svar-agent fra OLH
--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] .
Trouble? e-mail to [EMAIL PROTECTED] .
Ole B Hansen
22-07-97 09:18
Test af svar-agent fra OLH
--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] .
Trouble? e-mail to [EMAIL PROTECTED] .
Ole B Hansen
22-07-97 09:18
Test af svar-agent fra OLH
--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
[EMAIL PROTECTED] .
Trouble? e-mail to [EMAIL PROTECTED] .
On May 22, Kendrick Myatt wrote
> Be happy to make them... what all is involved? Do I have to have permission
> of the author or anything weird like that? Please point me in the direction
> oif whatever I need to get started.
Sorry for the delay...
To get started building Debian packages, you s
> Be happy to make them... what all is involved? Do I have to have permission
> of the author or anything weird like that? Please point me in the direction
> oif whatever I need to get started.
I was about to complain about the lack of documentation about this, then I
looked:
http://www.
Be happy to make them... what all is involved? Do I have to have permission
of the author or anything weird like that? Please point me in the direction
oif whatever I need to get started.
Thanks,
Kendrick
At 02:58 PM 5/22/97 +, Christian Hudon wrote:
>On May 22, Kendrick Myatt wrote
>> He
On May 22, Kendrick Myatt wrote
> Hello :)
>
> I have looked but not found many Debian packages of popular security
> programs such as crack, lsof, cops, iss, satan, swatch, etc. I did find
> tripwire on the debian site, though.
>
> Are these kept somewhere else, or do they not exist? Just wond
Hello :)
I have looked but not found many Debian packages of popular security
programs such as crack, lsof, cops, iss, satan, swatch, etc. I did find
tripwire on the debian site, though.
Are these kept somewhere else, or do they not exist? Just wondering if I
should go ahead an install the non-
Do you have any experience running SATAN ?? I as well as others in my
department are interested in running it, however I am wondering how
affective of a tool it is because others here have previously used a very
early version which was bug-gy.
Dennis
On Wed, 19 Mar 1997, Karl Sackett wrote
dpk writes:
>
> There is a program that probes a machine quite extensively for security
> holes (from what I hear from trusted sources). It is called SATAN
> (security analysis tool for auditing networks) Here is a few url's to get
> you going...
>
> http://www.interaus.net/1995/6/satan.html
There is a program that probes a machine quite extensively for security
holes (from what I hear from trusted sources). It is called SATAN
(security analysis tool for auditing networks) Here is a few url's to get
you going...
http://www.interaus.net/1995/6/satan.html
http://ciac.llnl.gov/ciac/b
Last I looked, cops was not debianized. There is little reason for
it since it need _lots_ (and simple) twinking to make it work right but with
minimal results. It is not worth it.
For filesystem security, it is worth to redirect your time to cfengine and
tripwire (both are debian packages),
Seems like there used to be a COPS package, or something similar,
that did a fairly automated security audit of one's Linux system.
Can't seem to find or recollect what it was. Anyone know of a
program to do this? Is it a Debian package?
Thanx!
--
Ken Gaugler N6OSK Santa Clara, California
e
44 matches
Mail list logo