Re: POC and patch for the CVE-2018-15473

2019-05-13 Thread Brett Glass
port of OpenSSH 7.8 available for FreeBSD 11-STABLE from the ports collection? If not, shouldn't it be? --Brett Glass Brahmanand Reddy writes: > regarding the CVE-2018-15473 dint find find official patch from the openssh > on freebsd OS base. CVE-2018-15473 is a user existence

Re: POC and patch for the CVE-2018-15473

2019-05-13 Thread Brett Glass
At 10:13 AM 5/13/2019, you wrote: On Mon 2019-05-13 (09:51), Brett Glass wrote: > Is the FreeBSD port of OpenSSH 7.8 available for FreeBSD 11-STABLE > from the ports collection and as a binary package? If not, shouldn't it be? Yes, you can use the original at /usr/ports/secur

Re: POC and patch for the CVE-2018-15473

2019-05-13 Thread Brett Glass
port of OpenSSH 7.8 available for FreeBSD 11-STABLE from the ports collection and as a binary package? If not, shouldn't it be? --Brett Glass Brahmanand Reddy writes: > regarding the CVE-2018-15473 dint find find official patch from the openssh > on freebsd OS base. CVE-2018-1547

Re: FreeBSD Security Advisory FreeBSD-SA-18:03.speculative_execution

2018-03-25 Thread Brett Glass
Intel Atom processors are also not susceptible. Only one of them does any out-of-order execution, and that one appears to do it in a way that is not susceptible to Meltdown or Spectre. --Brett Glass At 02:56 PM 3/20/2018, Christian Weisgerber wrote: On 2018-03-19, Ed Maste wrote: > Ther

Re: Response to Meltdown and Spectre

2018-01-12 Thread Brett Glass
ly on all of them. This would be a big help to those of us who would otherwise have to recompile the kernel and/or set a special tunable. --Brett Glass ___ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-s

Re: Response to Meltdown and Spectre

2018-01-12 Thread Brett Glass
some very limited exposure due to out-of-order execution, but may also not be vulnerable because the OOE is not speculative) to avoid unnecessary performance impacts? --Brett Glass At 05:14 AM 1/12/2018, Oliver Pinter wrote: The test patch is here: https://reviews.freebsd.

Re: Intel hardware bug

2018-01-04 Thread Brett Glass
segmentation faults - remember segments? - revealed bugs in their code. I, personally, liked segmentation because I was a perfectionist I wanted my code to crash dramatically if there was an error so I could fix it.) --Brett Glass ___ freebsd

Re: Intel hardware bug

2018-01-04 Thread Brett Glass
ry are not revealed directly to the program. So, how does it deduce the contents of physical memory merely from the fact that there's a cache miss on its address? --Brett Glass ___ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/m

Re: Intel hardware bug

2018-01-03 Thread Brett Glass
hey will not be slowed by patches intended for CPUs that actually need them.) --Brett Glass At 06:56 PM 1/2/2018, Joey Kelly wrote: On Tuesday, January 02, 2018 08:52:27 PM Mike Tancsa wrote: > I am guessing this will impact FreeBSD as well ? > > http://www.theregister.co.uk/2018/01/02/in

Re: fbsd11 & sshv1

2017-02-01 Thread Brett Glass
a darned sight safer than devolving to Telnet. Just as it's useful to have a way of accessing devices that use SSLv3 (we maintain browsers specifically for that purpose), it pays to have a way to get at an embedded device that will never support versions of SSH b

Re: Will 11.0-RELEASE include ASLR?

2016-03-09 Thread Brett Glass
iding them... in plain sight. Without getting into a flame war about that, I would simply like the option of compiling it in or not. --Brett Glass ___ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-securi

Re: Will 11.0-RELEASE include ASLR?

2016-03-09 Thread Brett Glass
that ASLR provides. --Brett Glass At 07:05 AM 3/9/2016, Piotr Kubaj wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Shawn Webb has recently announced that ASLR is complete on HardenedBSD. There are patches ready for FreeBSD to use and it's ready to be shipped in FreeBSD. However,

Re: HTTPS on freebsd.org, git, reproducible builds

2015-09-18 Thread Brett Glass
ting up a perfect scenario for an MITM attack that could substitute an infected file AND a forged checksum for the originals. If an HTTPS download site were available, I would absolutely prefer it to an HTTP one. Just my $0.02 USD. --Brett Glass __

Re: OpenSSH max auth tries issue

2015-07-20 Thread Brett Glass
Because a potential intruder can establish multiple or "tag-teamed" TCP sessions (possibly from different IPs) to the SSH server, a per-session limit is barely useful and will not slow a determined attacker. A global limit might, but would enable DoS attacks. --Brett Glass At 01:

Re: ntpd vulnerabilities

2014-12-22 Thread Brett Glass
probably become practical... IF one can trust the hardware not to have security holes or backdoors. Which is, of course, a big "if." --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebs

Re: ntpd vulnerabilities

2014-12-22 Thread Brett Glass
I'd like to propose that FreeBSD move to OpenNTPD, which appears to have none of the fixed or unfixed (!) vulnerabilities that are present in ntpd. There's already a port. --Brett Glass At 03:25 AM 12/22/2014, Steve Clement wrote: Chances are good it is vulnerab

Re: URGENT?

2014-03-23 Thread Brett Glass
POLA. I am working on a new rc.firewall that is much more efficient. the trouble is that the script to make it do what I want is a bit more complicated. I'll put it out for discussion later. maybe tonight. Would like to see it! --Brett Glass _

Re: URGENT? (was: Re: NTP security hole CVE-2013-5211?)

2014-03-22 Thread Brett Glass
e OSes appear to use randomized high ports for queries. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: NTP security hole CVE-2013-5211?

2014-03-21 Thread Brett Glass
D and I'm unsure why it was changed.) This makes stateful firewalling less necessary and improves its performance if it is done. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security

Re: NTP security hole CVE-2013-5211?

2014-03-20 Thread Brett Glass
At 10:38 PM 3/20/2014, Micheas Herman wrote: >While true, that does mean that amplification attacks are limited to being >able to attack those ten machines. The amplifier/relay is also a victim, and can be completely disabled by the attack if its link to the Net becomes saturated. -

Re: NTP security hole CVE-2013-5211?

2014-03-20 Thread Brett Glass
know that the above addresses are the defaults for any FreeBSD machine and can take advantage of these "holes" in your firewall. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-s

Re: NTP security hole CVE-2013-5211?

2014-03-20 Thread Brett Glass
y compiled to use source port 123. (Back in the days of FreeBSD 5.x and 6.x, it used ephemeral source ports, but not now.) --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: NTP security hole CVE-2013-5211?

2014-03-20 Thread Brett Glass
due to the lack of a 3-way handshake) that they need to be protected in every way possible. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "f

Re: NTP security hole CVE-2013-5211?

2014-03-15 Thread Brett Glass
o queries. I've implemented this in the IPFW rules of all of my servers. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: NTP security hole CVE-2013-5211?

2014-03-15 Thread Brett Glass
eries with rejection packets of the same size as the attack packets. If the source addresses of the attack packets are spoofed, the attack is relayed. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/fr

Re: NTP security hole CVE-2013-5211?

2014-03-14 Thread Brett Glass
ttacks, since this makes them more difficult to block. We have several patched servers which malicious parties are attempting to use as relays even though they cannot use them to amplify the volume of data sent. Once we altered ntp.conf, we were able to put a

Re: NTP security hole CVE-2013-5211?

2014-03-14 Thread Brett Glass
tion of the advisory but add the command "disable monitor" and add the "kod" option (which may quell queries from some exploited systems). --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/

Re: NTP security hole CVE-2013-5211?

2014-03-14 Thread Brett Glass
from a botnet. I'd recommend that the lines above be included in the default /etc/ntp.conf in all future releases, and that all systems that use the default ntp.conf without modification be patched automatically via freebsd-update. --Brett Glass

Re: FreeBSD Transient Memory problem?

2013-09-13 Thread Brett Glass
dit of FreeBSD 9.1-R-p2 compiled without >if_re module is not applicable to FreeBSD 9.1-R-p3 compiled with if_re >module nor to FreeBSD 9.1-R-p3 compiled without if_re module True, but the details of memory allocation and scrubbing are unlikely

Re: FreeBSD Transient Memory problem?

2013-09-12 Thread Brett Glass
-ccevs.org/CCEVS_Products/pcl.cfm?tech_name=Router There may be other products which have "FreeBSD inside" on their list as well. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security

Re: FreeBSD Transient Memory problem?

2013-09-12 Thread Brett Glass
cure OS so that their systems can be spied upon and their security compromised. --Brett Glass P.S. -- For more on NIAP, see www.niap-ccevs.org. Note that this site will deposit multiple tracking cookies in your browser which you may want to delete after v

Re: FreeBSD Transient Memory problem?

2013-09-12 Thread Brett Glass
FreeBSD has a "transient memory problem?" Not so far as I remember. But maybe I have a transient memory problem. ;-) --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To u

Re: FreeBSD Transient Memory problem?

2013-09-12 Thread Brett Glass
FreeBSD has a "transient memory problem?" Not so far as I remember. But maybe I have a transient memory problem. ;-) --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To u

Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver

2013-04-30 Thread Brett Glass
;t contain NFS, and I didn't build any loadable NFS modules, so I actually didn't need a rebuild.) --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, sen

Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver

2013-04-30 Thread Brett Glass
ty fix to apply. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver

2013-04-30 Thread Brett Glass
ernel. It's built without modules, so it's the only file in the directory /boot/kernel. The configuration file is at /sys/amd64/conf/GATEWAY. The identification string within the kernel is GATEWAY. I am not sure what you're driving at here, though, so please exp

Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver

2013-04-30 Thread Brett Glass
tor that a new build might be needed. --Brett Glass At 10:26 AM 4/30/2013, Chris Rees wrote: I agreed with Glen, but when checking the docs it turns out that they say that freebsd-update will detect a kernel in /boot/GENERIC: http://www.freebsd.org/doc/handbook/updating-upgrading-freebsdupdate

Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver

2013-04-30 Thread Brett Glass
the next reboot. If there's a power failure, the system may well not come up. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebs

Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver

2013-04-29 Thread Brett Glass
ustom kernels will want or expect. (I would have hoped that the GENERIC kernel, its modules, and the kernel sources would be updated and that I'd be reminded to rebuild my custom kernel if necessary.) --Brett Glass At 02:55 PM 4/29/2013, FreeBSD Security Advisories wrote: >-BEG

Re: Firewall Options

2013-03-05 Thread Brett Glass
) and becomes a bottleneck. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: FreeBSD Security Advisory FreeBSD-SA-12:06.bind

2012-11-22 Thread Brett Glass
of 9.1-RELEASE, which I'd hoped to install on servers during Thanksgiving! --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-securit

How much will intrusion delay 9.1-RELEASE?

2012-11-18 Thread Brett Glass
How much will the current security issue delay 9.1-RELEASE? I do want to see the integrity of the code protected, but must plan server updates, which I'd hoped to do over US Thanksgiving. (9.0-RELEASE is now within a couple of months of EOL unless it's extended.) --B

Re: getting the running patch level

2012-08-09 Thread Brett Glass
tall binary packages. Until and unless there's a convenient menu-based installer for binary packages, would it be possible to fix this glitch? --Brett Glass At 09:43 AM 8/9/2012, Henrik Andersen wrote: >Hi all, > >You can find the current patch level in /usr/src/sys/conf/newvers.sh ex:

Re: [HEADSUP] OpenSSL 1.0.1c merge in progress

2012-07-13 Thread Brett Glass
Will port also be MFCed to 9-RELENG and 9.1-RELEASE? Do not want to have to go to -CURRENT to get latest OpenSSL. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe

Re: Pull in upstream before 9.1 code freeze?

2012-07-04 Thread Brett Glass
le pain as possible. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: Pull in upstream before 9.1 code freeze?

2012-07-04 Thread Brett Glass
e the option of installing dnscache, with the so-called "Jumbo" patch, as the default resolver. I beleive that the code has been released into the public domain. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.o

Re: Default password hash

2012-06-08 Thread Brett Glass
e-computed dictionary to break accounts with weak or commonly used passwords. The larger the "salt," the more impractical it becomes to prepare or store such a dictionary. This can matter more than the strength or computational burden of the hashing algorithm. --Brett Glass At 06:51 AM 6/8/2012,

Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-11:07.chroot

2011-12-23 Thread Brett Glass
What ports, etc. must one recompile after applying this patch? It appears to modify libc. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "fr

Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix

2011-10-02 Thread Brett Glass
which tag? --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: Increase in SSH attacks as of announcement of rtld bug

2009-12-02 Thread Brett Glass
port scan.) And it would have the advantage that it could be integrated directly into SSH daemons and clients. --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send a

Re: Increase in SSH attacks as of announcement of rtld bug

2009-12-01 Thread Brett Glass
At 12:09 PM 12/1/2009, Mike Tancsa wrote: http://isc.sans.org/trends.html and http://isc.sans.org/port.html Do not seem to show any increase. Do those stats account for the fact that the attackers may first be fingerprinting servers to see if they're running FreeBSD? --Brett _

Increase in SSH attacks as of announcement of rtld bug

2009-12-01 Thread Brett Glass
SH client that integrates a single packet authentication system -- e.g. fwknop? I'm already seeking sources and a toolchain so that I can try my hand at doing this for TeraTerm.) --Brett Glass ___ freebsd-security@freebsd.org mailing list ht

Re: Upcoming FreeBSD Security Advisory

2009-11-30 Thread Brett Glass
At 06:20 PM 11/30/2009, FreeBSD Security Officer wrote: A short time ago a "local root" exploit was posted to the full-disclosure mailing list; as the name suggests, this allows a local user to execute arbitrary code as root. Yargh. Thank you for catching this. --Brett __

Re: Protecting against kernel NULL-pointer derefs

2009-09-27 Thread Brett Glass
lback for administrators, to allow them to keep their systems running while a bug was diagnosed and fixed. --Brett Glass At 12:39 PM 9/27/2009, Robert Watson wrote: FYI, changes are now going into head to implement this policy, although by slightly different mechanisms. I expect to se

Re: [Fwd: cvs commit: ports/dns/bind9 Makefile distinfo ports/dns/bind94 Makefile distinfo ports/dns/bind95 Makefile distinfo]

2008-07-11 Thread Brett Glass
ort blocks off, or naive users will fall prey to security holes in Microsoft products. But if BIND doesn't know to work around them, lookups will occasionally (and infuriatingly!) fail. --Brett Glass At 06:06 PM 7/10/2008, Doug Barton wrote: >First off, to those who were kind enou

Re: [fbsd] HEADS UP: FreeBSD 5.3, 5.4, 6.0 EoLs coming soon

2006-10-13 Thread Brett Glass
do this doesn't constitute a "fork" and is of enough value to warrant a bit of developer time (though obviously different developers will take different amounts of interest in maintaining "classic" releases). --Brett Glass __

Re: Integrity checking NANOBSD images

2006-07-30 Thread Brett Glass
. The expense and difficulty of hacking them all simultaneously would go up exponentially with the number of "team mates." --Brett Glass ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: Repeated attacks via SSH

2005-10-02 Thread Brett Glass
At 05:05 PM 10/2/2005, Kevin Day wrote: >This is pretty common, I'm afraid. SSH scanning with brute force >password guessing has gone through the roof in the last 9-12 months, >but it's been going on for years. > >We announce a /19 worth of space, and see several hundred ssh >connects per se

Re: Repeated attacks via SSH

2005-10-02 Thread Brett Glass
At 04:44 PM 10/2/2005, Marcin Jessa wrote: >B.T.W, did you also notice they harvest email addresses and send you >useless information about products you don't need? Was the above intended to be self-referential? ;-) --Brett ___ freebsd-security@freebs

Re: Repeated attacks via SSH

2005-10-02 Thread Brett Glass
At 04:12 PM 10/2/2005, Daniel Gerzo wrote: >very nice is to use AllowUsers in form of [EMAIL PROTECTED] If you can get away with it, absolutely. Same with the RSA keys. Of course, the problem is that if you need to get access in an emergency from who-knows-where, you're pretty much stuck with pas

Repeated attacks via SSH

2005-10-02 Thread Brett Glass
other ways!). Therefore, it's strongly recommended that, where practical, everyone limit SSH logins to the minimum possible number of users via the "AllowUsers" directive. We also have a log monitor that watches the logs (/var/log/auth.log in particular) and blackh

Re: Will 5.4 be an "Extended Life" release?

2005-04-18 Thread Brett Glass
ity fixes, why not just >install 4.11 and then apply the security fixes? That's fine for awhile, but there will soon be enough that this will be painful. And it may be a good idea to produce a release containing other code that's been backported from

Re: Will 5.4 be an "Extended Life" release?

2005-04-17 Thread Brett Glass
At 07:42 PM 4/17/2005, Colin Percival wrote: >FreeBSD 4.11 will be supported until at least January 2007. Any chance of a 4.12, incorporating some of the last bits that have been brought into 4-STABLE... especially the security fixes? (Since this is the -security list, it seems like a good plac

Re: Will 5.4 be an "Extended Life" release?

2005-04-17 Thread Brett Glass
11, favoring fast single CPUs over multiprocessor systems, for production machines -- and then jump to 6.0 when it's released. Will security fixes be available long enough for me to do this if need be? --Brett Glass ___ freebsd-security@freebsd.or