Re: Possible break-in attempt?

2018-07-18 Thread Jason Hellenthal
See etc/periodic/... security related scripts. Should get you on a good start. -- The fact that there's a highway to Hell but only a stairway to Heaven says a lot about anticipated traffic volume. > On Jul 18, 2018, at 16:47, Grzegorz Junka wrote: > > > Thank you Patrick, Simon and Dimitry

Re: http subversion URLs should be discontinued in favor of https URLs

2017-12-07 Thread Jason Hellenthal
The truly paranoid types that don’t want anyone to know they are using FreeBSD apparently. Honestly if they are that worried about http then get a private vpn tunnel and run through that instead ! > On Dec 7, 2017, at 16:27, Poul-Henning Kamp wrote: > > > In message <2a6d123c-8ee5-8e

Re: OpenSSH max auth tries issue

2015-07-18 Thread Jason Hellenthal
pf overload rules that I will not live without and along with the MaxAuthTries 3. Sorry for the top-post, some clients just don’t work that way ;) - -- Jason Hellenthal JJH48-ARIN On Jul 18, 2015, at 18:10, Mark Felder wrote: On Fri, Jul 17, 2015, at 14:19, Mike Tancsa wrote: No

Re: bash velnerability

2014-09-30 Thread Jason Hellenthal
uot; > NOT VULNERABLE > > This being said, I'm not confident that there won't be further issues found > with bash > > Regards, > -- > -Chuck > > ___ > freebsd-security@freebsd.org mailing list > http://lists.freebsd.org/mai

Re: bash velnerability

2014-09-30 Thread Jason Hellenthal
b/bashcheck/master/bashcheck >>> >>> Not vulnerable to CVE-2014-6271 (original shellshock) >>> Not vulnerable to CVE-2014-7169 (taviso bug) >>> ./bashcheck: line 18: 54908 Segmentation fault (core dumped) bash >>> -c "true $(printf '< /

Re: NEVERMIND! (was: Local Denial of Service: logger(1))

2014-05-25 Thread Jason Hellenthal
out an email to your admin group to alert them of the miscreant :-) -- Jason Hellenthal Voice: 95.30.17.6/616 JJH48-ARIN > On May 25, 2014, at 23:37, "Ronald F. Guilmette" > wrote: > > > In message <2091.1401074...@server1

Re: am I NOT hacked?

2014-04-26 Thread Jason Hellenthal
m you should take the steps to create a new clean system and migrate your data but j doubt this list is a justified medium to discuss all the possible avenues that you would have to cover on a possibly compromised system. Clean fresh system and start from there. Good luck -- Jason Helle

Re: freebsd openssh hole?

2014-04-11 Thread Jason Hellenthal
urity concerns among other open source projects leaves quite the distasteful essence on my tongue to use any of their software in any corporate environment whatsoever. Guess maturity comes in just as many flavors as Linux these days. -- Jason Hellenthal Voice: 95.30.17.6/616 JJH48-ARIN > O

Re: misc/187307: Security vulnerability with FreeBSD Jail

2014-03-05 Thread Jason Hellenthal
if you fall while sucking on them. Solution . . . sit down. -- Jason Hellenthal Voice: 95.30.17.6/616 JJH48-ARIN > On Mar 5, 2014, at 18:39, Xin Li wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > >> On 03/05/14 15:07, Nicola Galante wrote: >> I foun

Login failures usefulness with OpenSSH 6.1

2013-05-05 Thread Jason Hellenthal
4 14:54:14 disbatch sshd[9544]: input_userauth_request: invalid user root [preauth] May 4 18:44:04 disbatch sshd[18326]: fatal: Read from socket failed: Connection reset by peer [preauth] -- Jason Hellenthal JJH48-ARIN -(2^(N-1)) ___ freebsd-secu

Re: FreeBSD Security Advisory FreeBSD-SA-13:02.libc

2013-02-19 Thread Jason Hellenthal
No running daemons with listening ports effected that could trigger it? -- Jason Hellenthal JJH48-ARIN - (2^(N-1)) On Feb 19, 2013, at 10:48, "Philip M. Gollucci" wrote: > This is an internal only vuln with local user account. I see no need to > rush this one. We&#x

[rober...@redix.it: Please confirm your message]

2012-08-12 Thread Jason Hellenthal
inale non verra' consegnato al destinatario. Date: Sun, 12 Aug 2012 12:34:48 -0400 From: Jason Hellenthal To: Dag-Erling Smørgrav Cc: "Simon L. B. Nielsen" , freebsd-security@freebsd.org, Roberto Subject: Re: getting the running patch level On Sat, Aug 11, 2012 at 09:05:44PM

Re: getting the running patch level

2012-08-12 Thread Jason Hellenthal
On Sat, Aug 11, 2012 at 09:05:44PM +0200, Dag-Erling Smørgrav wrote: > "Simon L. B. Nielsen" writes: > > This has been discussed a number of time, but there are no nice and > > simple solution. > > There is a simple solution that, while not bulletproof, would work well > enough in most cases: hav

Re: Pull in upstream before 9.1 code freeze?

2012-07-04 Thread Jason Hellenthal
On Wed, Jul 04, 2012 at 10:01:04AM -0700, Freddie Cash wrote: > On Wed, Jul 4, 2012 at 9:51 AM, Simon L. B. Nielsen wrote: > > On Tue, Jul 3, 2012 at 9:39 PM, Doug Barton wrote: > >> On 07/03/2012 05:39, Dag-Erling Smørgrav wrote: > >>> Doug Barton writes: > The correct solution to this p

Re: BSD TelnetD Exploit on one of my servers

2012-06-26 Thread Jason Hellenthal
How about some sort of indication of what you are running... uname -a ? On Wed, Jun 27, 2012 at 12:17:01AM +0200, trap9 trap9 wrote: > This is what I find on one of my servers : > It appears to be a telnet exploit code for CVE-2011-4862. > > http://www.4shared.com/zip/mgSStKnU/wolverine-final.h

Re: / owned by bin causes sshd to complain bad ownership

2012-06-22 Thread Jason Hellenthal
On Fri, Jun 22, 2012 at 06:11:40PM -0500, Scott Lambert wrote: > On Fri, Jun 22, 2012 at 07:15:25PM +0200, Julian H. Stacey wrote: > > Jason Hellenthal wrote: > > > > > > On Fri, Jun 22, 2012 at 03:43:47PM +0200, Julian H. Stacey wrote: > > > > Over use of

Re: / owned by bin causes sshd to complain bad ownership

2012-06-22 Thread Jason Hellenthal
On Fri, Jun 22, 2012 at 03:43:47PM +0200, Julian H. Stacey wrote: > Hi freebsd-security@freebsd.org > On an 8.3-RELEASE running sshd, /var/log/auth.log > Jun 22 12:54:06 lapr sshd[57505]: Authentication refused: > bad ownership or modes for directory / > Until I did > c

Re: (Free 7.2) "su -l" didnt prompt password.Is it possbile?

2012-06-18 Thread Jason Hellenthal
On Mon, Jun 18, 2012 at 05:31:54PM +0400, Budnev Vladimir wrote: > Hello everyone. > We'v noticed some strange situation. After reboot and login, system > didn't ask for password while switchig with su -l. > > In details, there was root login from terminal and one from ssh. > Terminal login was

[0x72142...@gmail.com: [php<=5.4.3] Parsing Bug in PHP PDO prepared statements may lead to access violation]

2012-06-12 Thread Jason Hellenthal
FYI I verified this on a working system. - Forwarded message from 0x721427D8 0x721427D8 <0x72142...@gmail.com> - Date: Sun, 10 Jun 2012 15:02:43 +0200 From: 0x721427D8 0x721427D8 <0x72142...@gmail.com> To: bugt...@securityfocus.com Subject: [php<=5.4.3] Parsing Bug in PHP PDO prepared s

Re: Default password hash

2012-06-09 Thread Jason Hellenthal
On Sat, Jun 09, 2012 at 12:04:25AM -0400, emu wrote: > On 2012-06-09 00:01, Robert Simmons wrote: > > On Fri, Jun 8, 2012 at 9:06 AM, Maxim Khitrov > > wrote: > >> On Fri, Jun 8, 2012 at 8:51 AM, Dag-Erling Smørgrav > >> wrote: > >>> We still have MD5 as our default password hash, even though

Re: periodic security run output gives false positives after 1 year

2012-02-18 Thread Jason Hellenthal
On Sat, Feb 18, 2012 at 04:35:20PM -0500, Robert Simmons wrote: > On Fri, Feb 17, 2012 at 6:56 PM, Roger Marquis wrote: > > I don't personally recall a time when everything else wasn't logging the > > year, in one format or another.  That's not to imply that syslogs > > shouldn't be distinguisha

Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix [REVISED]

2011-11-20 Thread Jason Hellenthal
Sorry but this security advisory has nothing to do with your misconfiguration of your system. On Sun, Nov 20, 2011 at 11:18:33PM +, Richard M. Timoney wrote: > As far as I can see the bug mentioned in the above advisory is not fully > fixed. > > When logged in to a FreeBSD 8.2 machine with

Re: Starting X11 with kernel secure level greater than -1/0.

2011-11-16 Thread Jason Hellenthal
If it is your objective to run an X server on your display then it would probably suit you best to use MAC rather than securelevel. Opening /dev/(mem,kmem,io) is a security vulnerability in itself which nearly scrathes any usefulness of securelevel. In short form, what you think you are doing a

Re: PAM modules

2011-09-21 Thread Jason Hellenthal
On Wed, Sep 21, 2011 at 08:42:48AM -0500, Brooks Davis wrote: > On Tue, Sep 20, 2011 at 05:21:03PM -0700, Xin LI wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > On 09/20/11 15:51, Kostik Belousov wrote: > > [...] > > > Yes, the question of maintanence of the OpenLDAP code

Re: PAM modules

2011-09-16 Thread Jason Hellenthal
+1 for LDAP On Fri, Sep 16, 2011 at 10:25:16PM -0500, Brandon Gooch wrote: > On Sep 16, 2011 10:21 AM, "Dag-Erling Smørgrav" wrote: > > > > We currently have a number of PAM modules in ports, and while some of > > them are specific to certain third-party software, many aren't. I > > believe we

Re: PAM modules

2011-09-16 Thread Jason Hellenthal
On Sat, Sep 17, 2011 at 01:18:27AM -0400, Jason Hellenthal wrote: > > +1 for LDAP > > On Fri, Sep 16, 2011 at 10:25:16PM -0500, Brandon Gooch wrote: > > On Sep 16, 2011 10:21 AM, "Dag-Erling Smørgrav" wrote: > > > > > > We currently have a num

Re: Rooting FreeBSD , Privilege Escalation using Jails (P�tur)

2011-05-09 Thread Jason Hellenthal
Quick way to lock your system down to only root: ( chmod g= / ) ***Emergency Use Only "molly guard not present" "slippery when throbbed" Side effect of that is its not really nice for processes that run with lower privileges and isn't always apparent why things are not working correctly so its best to just use nologin or drop to SU. -- Regards, (jhell) Jason Hellenthal pgp62dnK4HPnB.pgp Description: PGP signature

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-09 Thread Jason Hellenthal
g though and return 0 for any operation with the sole argument of /. -- Regards, (jhell) Jason Hellenthal pgpkkDKXlMXYl.pgp Description: PGP signature

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-08 Thread Jason Hellenthal
Chris, On Sun, May 08, 2011 at 09:58:05AM +0100, Chris Rees wrote: > On 8 May 2011 08:52, Jason Hellenthal wrote: > > > > Edho, > > > > On Sun, May 08, 2011 at 09:15:28AM +0700, Edho P Arief wrote: > >> On Sun, May 8, 2011 at 5:31 AM, Jamie Landeg Jones &g

Re: Rooting FreeBSD , Privilege Escalation using Jails (P??????tur)

2011-05-08 Thread Jason Hellenthal
o anything he or she wants unless you have taken precaution to not allow that. I would reccoment storing your jails two levels deep into a directory and chmod(1) 700 the first level to prevent access from the host and from the jailed root user changing the perms. -- Regards, (jhell) Jason Hellenthal pgpVO1qaQpzlX.pgp Description: PGP signature