Re: Possible break-in attempt?

2018-07-20 Thread Jamie Landeg-Jones
Dimitry Andric wrote: > For each incoming IP address, sshd does a reverse lookup, and if that > results in a hostname, it does another lookup of that hostname, to see > if *that* result matches the original incoming IP address. If it does > not, you get this scary warning in syslog about a "poss

Re: http subversion URLs should be discontinued in favor of https URLs

2017-12-14 Thread Jamie Landeg-Jones
Gordon Tetlow wrote: > I want to move the default for svn to be HTTPS. This would mean setting > up a redirect on http://svn.freebsd.org -> https://svn.freebsd.org. For Blimey! You're either very brave, or haven't read the thread fully! :-) ___ freebsd

Re: http subversion URLs should be discontinued in favor of https URLs

2017-12-11 Thread Jamie Landeg-Jones
Matthew Finkel wrote: > Why doesn't everyone have that option? Why is broadcasting a users information > across the internet forced upon them? Shouldn't they have a choice? They do! HTTPS already exists! This thread is about removing HTTP and forcing HTTPS - "Why should HTTPS be forced upon the

Re: http subversion URLs should be discontinued in favor of https URLs

2017-12-11 Thread Jamie Landeg-Jones
John-Mark Gurney wrote: > So you're fine w/ all the Comcast users having to switch ISPs? Because > Comcast modifies traffic. So you're now saying that if you use FreeBSD > you can't use Comcast as your ISP? ... or they could use HTTPS, which exists. This thread started with the proposal to re

Re: http subversion URLs should be discontinued in favor of https URLs

2017-12-05 Thread Jamie Landeg-Jones
"Poul-Henning Kamp" wrote: > simple-minded IT-liberalistic "Encrypt everything" campaign is, > 100% as predicted, pushing governments to neuter encryption in > order to keep the court systems working. I agree. Unfortunately forums.freebsd.org not only went down the 'encrypt everything' route, th

Re: ntpd vulnerabilities

2014-12-22 Thread Jamie Landeg-Jones
Brett Glass wrote: > Within my own network, I have used cron and ntpdate (even though it's > officially deprecated) on most of the clients, querying a couple of I think ntpdate is only deprecated because it's functionality is provided by 'ntpd -q' > on them. But it obviously has some drawbacks;

Potential security issues with new top level domains?

2014-11-16 Thread Jamie Landeg-Jones
As if I needed another reason to hate the new top level domain free-for-all, I was checking on one of my machines earlier, and forgot that I'd renamed it, so it is no longer in my domains DNS. This was the result: | 2:13 (2) "~" jamie@catflap% ping android | PING android (127.0.53.53): 56 data b

Re: NEVERMIND!

2014-05-27 Thread Jamie Landeg-Jones
I've not actually used it, but I notice this in ports: /usr/ports/sysutils/socklog: | svlogd has a built in log file rotation based on file size, so there is no | need for any cron jobs or similar to rotate the logs. Log partitions can be | calculated properly. | | WWW: http://smarden.org/so

Re: ports requiring OpenSSL not honouring OpenSSL from ports

2014-04-27 Thread Jamie Landeg-Jones
Paul Hoffman wrote: > Yes, that is a reasonable expectation. I certainly had it in my head when I > rebuilt Sendmail+TLS after heartbleed, but I didn't think of checking it. Been there :-) Fortunately, sendmail 'does the right thing'! > It would be good to add such options to as many ports as

Re: ports requiring OpenSSL not honouring OpenSSL from ports

2014-04-27 Thread Jamie Landeg-Jones
Scot Hetzel wrote: > The port should use the OpenSSL port if it is installed, unless the > port sets one of these variables in it's Makefile: > > WITH_OPENSSL_BASE > USE_OPENSSL_BASE > > The port shouldn't be setting these variables. Thanks. As I expected. > Do you have a list of which ports us

ports requiring OpenSSL not honouring OpenSSL from ports

2014-04-27 Thread Jamie Landeg-Jones
One of the first things I do on installing a new machine is install OpenSSL from ports. I do build with base OpenSSL due to the many programs that depend on it, but using ports OpenSSL for ports makes things easier to patch/update. In the case of Heartbleed, for example, I was able to fix ports Op

Re: De Raadt + FBSD + OpenSSH + hole?

2014-04-20 Thread Jamie Landeg-Jones
"hcoin" wrote: > local variables) harms performance. It's also true doing both of these > things would not fix the flaw that 'opened the window' onto these data. > However it is true that doing so would make the exploit valueless as > 'opening a window' onto erased data would reveal nothing

Re: De Raadt + FBSD + OpenSSH + hole?

2014-04-20 Thread Jamie Landeg-Jones
RW wrote: > It can return the physical memory, but there are a couple of caveats. > Firstly, it can only return whole pages. Secondly, it's not returned > instantaneously to avoid the overhead of page-faults and zeroing pages > if that region is remalloced. It's left to the page-daemon to recover

Re: De Raadt + FBSD + OpenSSH + hole?

2014-04-20 Thread Jamie Landeg-Jones
Nathan Dorfman wrote: > free() doesn't usually "free memory back to the system." It just puts > it back onto a "free list" managed by libc, entirely within the > process's address space. > > "Use after free" is actually a rather common type of bug -- do a web > search on that term to see just how

Re: De Raadt + FBSD + OpenSSH + hole?

2014-04-20 Thread Jamie Landeg-Jones
> I wonder how many security holes, both those known and as yet unrevealed > or unknown, would not be of any exploit value if in all security related > libraries and applications the routine to free allocated memory > allocation closest to the user app/library set the newly free memory to > a

Re: De Raadt + FBSD + OpenSSH + hole?

2014-04-19 Thread Jamie Landeg-Jones
Bryan Drewery wrote: > On 4/14/2014 7:32 AM, Jamie Landeg-Jones wrote: > > > > As to the specific question, I don't think his ego would allow a bug > > in openssh to persist, so even if it does, I'd suspect it's not too > > serious (or it's non-t

Re: De Raadt + FBSD + OpenSSH + hole?

2014-04-14 Thread Jamie Landeg-Jones
Matt Dawson wrote: > My first thought when I saw this was "ego over ethics," which says more > about Theo than FreeBSD. Totally. I know Theo has a reputation for being 'difficult', but in my opinion, this outburst really calls into question his perceived motivations regarding secure software.

Re: ftpd security issue ?

2011-12-11 Thread Jamie Landeg Jones
> > Are the following steps enough to prevent me? > > > > # for user in user1 user2 ; do > > mkdir -p ~$user/lib ~$user/usr/lib ~$user/etc > > chflags sunlink,schg ~$user/lib ~$user/usr ~$user/usr/lib ~$user/etc > > done > > # > > Yes that should be sufficient workaround. I'd modify that to a

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-11 Thread Jamie Landeg Jones
> +1 I did mention the bikeshed earlier ! :D ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-10 Thread Jamie Landeg Jones
> It is still required for .. to work. > > For example, if the /usr directory on / is 700 but the directory on the > mounted filesystem is 755, everyone can use pathnames under /usr but only > root can use /usr/.. which is confusing and undesirable. > > > I always make mount-points 0111 these days

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-10 Thread Jamie Landeg Jones
> Dumb question: the jail command can refuse to run unless the > parent of a jail root is 0700. Would that work? No kernel hack > required. Haha, all talking about kernel hacks and so on, and yet, to me, that seems the simplest, but ALSO, the most elegent solution. I'd have some override flag tha

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-10 Thread Jamie Landeg Jones
> Why not ? What sense does having -r+x make? Because on some old systems I used to work with, you needed +x for it to work. Now I know works on FreeBSD, I'll try to remember to use that instead! ___ freebsd-security@freebsd.org mailing list htt

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-10 Thread Jamie Landeg Jones
> It used to confuzzle sysadmins on SUNos when the mount point was > 0700. The underlying mode disapeared when the mount was made, but it > was still being enforced. Suddenly no one but root could use say /usr > even though it was apparently 0755 I remember that happening! I thought it was like t

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-10 Thread Jamie Landeg Jones
> Do you know if there is a way that chmod on / from within the jail could > be prevented easily without breaking something ? Maybe not failing but > falling though and return 0 for any operation with the sole argument of /. Enforcing 700 on the jail root? Whilst I was wrong on chmod 700 on (s

Re: Rooting FreeBSD , Privilege Escalation using Jails (P�tur)

2011-05-09 Thread Jamie Landeg Jones
> > A jail won't work for not-root users if the jail root directory is chmod > > 700 - although > > there is obviously a 'chroot' running withing the jail, the jailed user > > still needs > > to have read permission from the hosts / -- chmod 700 therefore locks all > > non-root > > users out. >

Re: Rooting FreeBSD , Privilege Escalation using Jails (P�tur)

2011-05-07 Thread Jamie Landeg Jones
> All the same, I've sent a PR [1] with some doc patches to make people > more aware of this -- fulfilling my promise of 2+ years ago :S > > Thanks! > > Chris > > [1] http://www.freebsd.org/cgi/query-pr.cgi?pr=156853 Um. Some problems here. A jail won't work for not-root users if the jail root di

Re: mbuf security advisory for 7.2-RELEASE?

2010-11-18 Thread Jamie Landeg Jones
> >> Just to confirm, 7.2-RELEASE is not effected by this issue?  Just > >> seems odd that all versions of 7.x are listed minus 7.2-RELEASE. > > > > 7.2-RELEASE was out of support when the advisory was issued. > > It *is* vulnerable. > > Thought so! Thanks guys! It just wasn't clear to me. Easy

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> Any body can explain why no credit section for this advisory? Probably because the person who found the bug didn't notify the security team, but posted it on a public list to gain l33t points. ___ freebsd-security@freebsd.org mailing list http://lists.

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> > On 12/03/2009 08:01 PM, Pieter de Boer wrote: > > Jamie Landeg Jones wrote: > >> > >> However, I'd still apply the patch in case some other way to exploit > >> the non-checking of the unsetenv return status crops up elsewhere. > >> > &g

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> The discussion you mention presumably involves checking out the patched > version of rtld sources from 7.x or 8 and building+installing that under 6.x. > Given that 6.x rtld is the older one with a longer history of security > review and doesn't have the current known vulnerability, whereas t

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> So, what would be 'best of practice' to apply the patch to 6.3-RELEASE > upwards -- is the FreeBSD-7 patch applicable or should one wait for an > official announcement? I just noticed that the patch I replied with is basically the same as the Freebsd-7 patch that was posted. However, as has a

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> Jamie Landeg Jones ha scritto: > > > So, yes, FreeBSD 6.3-RELEASE upwards are affected - FreeBSD 6.2 isn't. > > Thanks. > So, is a patch on the way for 6.[34] too? > I guess the sec team just wanted to get out what they had as soon as > possible and I agree wi

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Jamie Landeg Jones
> Sorry, this might seem a stupid question, but... > In several places I read that FreeBSD 6.x is NOT affected; however, I > heard some people discussing how to apply the patch to such systems. > So, I'd like to know for sure: is 6.x affected? Is another patch on the > way for it? > > bye & Tha