See etc/periodic/... security related scripts. Should get you on a good start.
--
The fact that there's a highway to Hell but only a stairway to Heaven says a
lot about anticipated traffic volume.
> On Jul 18, 2018, at 16:47, Grzegorz Junka wrote:
>
>
> Thank you Patrick, Simon and Dimitry
The truly paranoid types that don’t want anyone to know they are using FreeBSD
apparently.
Honestly if they are that worried about http then get a private vpn tunnel and
run through that instead !
> On Dec 7, 2017, at 16:27, Poul-Henning Kamp wrote:
>
>
> In message <2a6d123c-8ee5-8e
pf
overload rules that I will not live without and along with the MaxAuthTries 3.
Sorry for the top-post, some clients just don’t work that way ;)
- --
Jason Hellenthal
JJH48-ARIN
On Jul 18, 2015, at 18:10, Mark Felder wrote:
On Fri, Jul 17, 2015, at 14:19, Mike Tancsa wrote:
No
uot;
> NOT VULNERABLE
>
> This being said, I'm not confident that there won't be further issues found
> with bash
>
> Regards,
> --
> -Chuck
>
> ___
> freebsd-security@freebsd.org mailing list
> http://lists.freebsd.org/mai
b/bashcheck/master/bashcheck
>>>
>>> Not vulnerable to CVE-2014-6271 (original shellshock)
>>> Not vulnerable to CVE-2014-7169 (taviso bug)
>>> ./bashcheck: line 18: 54908 Segmentation fault (core dumped) bash
>>> -c "true $(printf '< /
out an
email to your admin group to alert them of the miscreant :-)
--
Jason Hellenthal
Voice: 95.30.17.6/616
JJH48-ARIN
> On May 25, 2014, at 23:37, "Ronald F. Guilmette"
> wrote:
>
>
> In message <2091.1401074...@server1
m you should take the steps to create a
new clean system and migrate your data but j doubt this list is a justified
medium to discuss all the possible avenues that you would have to cover on a
possibly compromised system.
Clean fresh system and start from there.
Good luck
--
Jason Helle
urity concerns among other open source projects leaves quite
the distasteful essence on my tongue to use any of their software in any
corporate environment whatsoever. Guess maturity comes in just as many flavors
as Linux these days.
--
Jason Hellenthal
Voice: 95.30.17.6/616
JJH48-ARIN
> O
if you fall while sucking on them. Solution . . . sit down.
--
Jason Hellenthal
Voice: 95.30.17.6/616
JJH48-ARIN
> On Mar 5, 2014, at 18:39, Xin Li wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
>> On 03/05/14 15:07, Nicola Galante wrote:
>> I foun
4 14:54:14 disbatch sshd[9544]: input_userauth_request: invalid user root
[preauth]
May 4 18:44:04 disbatch sshd[18326]: fatal: Read from socket failed:
Connection reset by peer [preauth]
--
Jason Hellenthal
JJH48-ARIN
-(2^(N-1))
___
freebsd-secu
No running daemons with listening ports effected that could trigger it?
--
Jason Hellenthal
JJH48-ARIN
- (2^(N-1))
On Feb 19, 2013, at 10:48, "Philip M. Gollucci" wrote:
> This is an internal only vuln with local user account. I see no need to
> rush this one. We
inale non verra' consegnato al destinatario.
Date: Sun, 12 Aug 2012 12:34:48 -0400
From: Jason Hellenthal
To: Dag-Erling Smørgrav
Cc: "Simon L. B. Nielsen" , freebsd-security@freebsd.org,
Roberto
Subject: Re: getting the running patch level
On Sat, Aug 11, 2012 at 09:05:44PM
On Sat, Aug 11, 2012 at 09:05:44PM +0200, Dag-Erling Smørgrav wrote:
> "Simon L. B. Nielsen" writes:
> > This has been discussed a number of time, but there are no nice and
> > simple solution.
>
> There is a simple solution that, while not bulletproof, would work well
> enough in most cases: hav
On Wed, Jul 04, 2012 at 10:01:04AM -0700, Freddie Cash wrote:
> On Wed, Jul 4, 2012 at 9:51 AM, Simon L. B. Nielsen wrote:
> > On Tue, Jul 3, 2012 at 9:39 PM, Doug Barton wrote:
> >> On 07/03/2012 05:39, Dag-Erling Smørgrav wrote:
> >>> Doug Barton writes:
> The correct solution to this p
How about some sort of indication of what you are running...
uname -a ?
On Wed, Jun 27, 2012 at 12:17:01AM +0200, trap9 trap9 wrote:
> This is what I find on one of my servers :
> It appears to be a telnet exploit code for CVE-2011-4862.
>
> http://www.4shared.com/zip/mgSStKnU/wolverine-final.h
On Fri, Jun 22, 2012 at 06:11:40PM -0500, Scott Lambert wrote:
> On Fri, Jun 22, 2012 at 07:15:25PM +0200, Julian H. Stacey wrote:
> > Jason Hellenthal wrote:
> > >
> > > On Fri, Jun 22, 2012 at 03:43:47PM +0200, Julian H. Stacey wrote:
> > > > Over use of
On Fri, Jun 22, 2012 at 03:43:47PM +0200, Julian H. Stacey wrote:
> Hi freebsd-security@freebsd.org
> On an 8.3-RELEASE running sshd, /var/log/auth.log
> Jun 22 12:54:06 lapr sshd[57505]: Authentication refused:
> bad ownership or modes for directory /
> Until I did
> c
On Mon, Jun 18, 2012 at 05:31:54PM +0400, Budnev Vladimir wrote:
> Hello everyone.
> We'v noticed some strange situation. After reboot and login, system
> didn't ask for password while switchig with su -l.
>
> In details, there was root login from terminal and one from ssh.
> Terminal login was
FYI
I verified this on a working system.
- Forwarded message from 0x721427D8 0x721427D8 <0x72142...@gmail.com> -
Date: Sun, 10 Jun 2012 15:02:43 +0200
From: 0x721427D8 0x721427D8 <0x72142...@gmail.com>
To: bugt...@securityfocus.com
Subject: [php<=5.4.3] Parsing Bug in PHP PDO prepared s
On Sat, Jun 09, 2012 at 12:04:25AM -0400, emu wrote:
> On 2012-06-09 00:01, Robert Simmons wrote:
> > On Fri, Jun 8, 2012 at 9:06 AM, Maxim Khitrov
> > wrote:
> >> On Fri, Jun 8, 2012 at 8:51 AM, Dag-Erling Smørgrav
> >> wrote:
> >>> We still have MD5 as our default password hash, even though
On Sat, Feb 18, 2012 at 04:35:20PM -0500, Robert Simmons wrote:
> On Fri, Feb 17, 2012 at 6:56 PM, Roger Marquis wrote:
> > I don't personally recall a time when everything else wasn't logging the
> > year, in one format or another. That's not to imply that syslogs
> > shouldn't be distinguisha
Sorry but this security advisory has nothing to do with your misconfiguration
of your system.
On Sun, Nov 20, 2011 at 11:18:33PM +, Richard M. Timoney wrote:
> As far as I can see the bug mentioned in the above advisory is not fully
> fixed.
>
> When logged in to a FreeBSD 8.2 machine with
If it is your objective to run an X server on your display then it would
probably suit you best to use MAC rather than securelevel. Opening
/dev/(mem,kmem,io) is a security vulnerability in itself which nearly scrathes
any usefulness of securelevel. In short form, what you think you are doing a
On Wed, Sep 21, 2011 at 08:42:48AM -0500, Brooks Davis wrote:
> On Tue, Sep 20, 2011 at 05:21:03PM -0700, Xin LI wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > On 09/20/11 15:51, Kostik Belousov wrote:
> > [...]
> > > Yes, the question of maintanence of the OpenLDAP code
+1 for LDAP
On Fri, Sep 16, 2011 at 10:25:16PM -0500, Brandon Gooch wrote:
> On Sep 16, 2011 10:21 AM, "Dag-Erling Smørgrav" wrote:
> >
> > We currently have a number of PAM modules in ports, and while some of
> > them are specific to certain third-party software, many aren't. I
> > believe we
On Sat, Sep 17, 2011 at 01:18:27AM -0400, Jason Hellenthal wrote:
>
> +1 for LDAP
>
> On Fri, Sep 16, 2011 at 10:25:16PM -0500, Brandon Gooch wrote:
> > On Sep 16, 2011 10:21 AM, "Dag-Erling Smørgrav" wrote:
> > >
> > > We currently have a num
Quick way to lock your system down to only root: ( chmod g= / )
***Emergency Use Only "molly guard not present" "slippery when throbbed"
Side effect of that is its not really nice for processes
that run with lower privileges and isn't always apparent why things are
not working correctly so its best to just use nologin or drop to SU.
--
Regards, (jhell)
Jason Hellenthal
pgp62dnK4HPnB.pgp
Description: PGP signature
g though and return 0 for any operation with the sole argument of /.
--
Regards, (jhell)
Jason Hellenthal
pgpkkDKXlMXYl.pgp
Description: PGP signature
Chris,
On Sun, May 08, 2011 at 09:58:05AM +0100, Chris Rees wrote:
> On 8 May 2011 08:52, Jason Hellenthal wrote:
> >
> > Edho,
> >
> > On Sun, May 08, 2011 at 09:15:28AM +0700, Edho P Arief wrote:
> >> On Sun, May 8, 2011 at 5:31 AM, Jamie Landeg Jones
&g
o anything he or she wants unless you have taken
precaution to not allow that. I would reccoment storing your jails two
levels deep into a directory and chmod(1) 700 the first level to prevent
access from the host and from the jailed root user changing the perms.
--
Regards, (jhell)
Jason Hellenthal
pgpVO1qaQpzlX.pgp
Description: PGP signature
30 matches
Mail list logo