Re: Possible break-in attempt?

2018-07-18 Thread Patrick Proniewski
On 18 juil. 2018, at 22:25, Grzegorz Junka wrote: > > I am interested what security precaution FreeBSD is trying to do here. Is the > sshd server receiving an ssh login request from an IP, that can't be resolved > back to a domain in the reverse DNS (PTR) record for that IP? this is quite usua

Re: Possible break-in attempt?

2018-07-18 Thread Patrick Proniewski
Hi, You can ignore them totally (you should), and if you can't, make sure you limit possibility of brute force attack on your sshd: - configure a firewall to stop them - and/or activate blacklistd on sshd - and/or change listening port of sshd I get thousands of these every day, won't kill you

Re: Forums.FreeBSD.org - SSL Issue?

2015-05-14 Thread Patrick Proniewski
On 14 mai 2015, at 16:13, jungle Boogie wrote: > On 14 May 2015 at 06:08, Mark Felder wrote: >> >> TLS 1.0 is dead and is even now banned in new installations according to >> the PCI DSS 3.1 standards. Nobody should expect TLS 1.0 to be supported >> by *any* HTTPS site now. > > > Here, here! W

Re: Forums.FreeBSD.org - SSL Issue?

2015-05-14 Thread Patrick Proniewski
On 14 mai 2015, at 12:02, Ian Smith wrote: > Well, I can't reach https://forums.freebsd.org/ at all at the moment, my > (admittedly ancient, on 8.2) SeaMonkey now consistenly reports: > > "Data Transfer Interrupted > The connection to forums.freebsd.org has terminated unexpectedly. Some > data

Re: Forums.FreeBSD.org - SSL Issue?

2015-05-14 Thread Patrick Proniewski
On 13 mai 2015, at 23:18, Anders Gulden Olstad wrote: > Qualys report chain issues that's pretty odd, because I've checked too just after sending my reply to the list (message id a2d58ccb-8b0a-40ff-9ed1-89b698a83...@patpro.net), and Qualys reported no issues at all about the chain. That was abo

Re: Bash ShellShock bug(s)

2014-09-29 Thread Patrick Proniewski
(cc ehaupt@ about the core dump of latest bash port) On 29 sept. 2014, at 09:34, Кулешов Алексей wrote: > Right. Okay then, here it is: > > # pkg remove bash > ... change 'bash' to 'sh' in bashcheck ... > # sh bashcheck > Not vulnerable to CVE-2014-6271 (original shellshock) > Not vulnerable to

Re: Bash ShellShock bug(s)

2014-09-29 Thread Patrick Proniewski
On 29 sept. 2014, at 09:09, Kuleshov Aleksey wrote: > There is a repository https://github.com/hannob/bashcheck with convenient > script to check for vulnerabilities. > > % sh bashcheck > Vulnerable to CVE-2014-6271 (original shellshock) > Vulnerable to CVE-2014-7169 (taviso bug) > Not vulnera

Re: OpenPAM/SSHD privacy hole (FreeBSD 9.2+ affected)

2013-10-27 Thread Patrick Proniewski
On 27 oct. 2013, at 22:50, Andrei wrote: > On Sun, 27 Oct 2013 22:33:56 +0100 > Dag-Erling Smørgrav wrote: > >> Andrei writes: >>> In /etc/pam.d/sshd from: >>> authrequiredpam_unix.so no_warn >>> try_first_pass to: >>> auth required pam_unix.so no_warn try_first_

Re: audit events confusion

2013-01-07 Thread Patrick Proniewski
On 7 janv. 2013, at 15:55, Mike Tancsa wrote: > If you or anyone else can point me to any other interesting resources > about the world of audit, I would love to see it. I guess some > interesting stuff is going in the 10 branch as well. You might want to subscribe to it's a very low traffic ML

ZFS / Antivirus

2013-01-07 Thread Patrick Proniewski
Hi all, As I understand it, ZFS includes a feature allowing to trigger an antivirus scan when a file system write is issued. The proper hook seems to exist only on Solaris. Is there any plan to activate this feature on FreeBSD ? thanks, and happy new year ;) patpro smime.p7s Description: S/MI

Re: audit events confusion

2013-01-06 Thread Patrick Proniewski
On 06 janv. 2013, at 23:46, Mike Tancsa wrote: > Hi, > Thanks for the reply! Where can I find setaudit ? you might find some useful info here too: http://forums.freebsd.org/showthread.php?t=23716 patpro smime.p7s Description: S/MIME cryptographic signature

Re: audit events confusion

2013-01-06 Thread Patrick Proniewski
On 06 janv. 2013, at 23:46, Mike Tancsa wrote: > Thanks for the reply! Where can I find setaudit ? here: http://people.freebsd.org/~csjp/setaudit.c patpro smime.p7s Description: S/MIME cryptographic signature

Re: audit events confusion

2013-01-06 Thread Patrick Proniewski
On 06 janv. 2013, at 23:11, Mike Tancsa wrote: > But if I make a simple php script to try and connect out, again, pflog0 > blocks it and logs it, but it does not show up in the audit logs > > 17:07:46.518501 rule 433/0(match): block out on em0: 64.7.xx.xx.36528 > > 8.8.8.8.25: Flags [S], seq 1724

zfs noexec override, sort of.

2012-02-08 Thread Patrick Proniewski
Hi, Not sure if it's a real security issue, or if it's a feature. ZFS allows the admin to create noexec volumes, so that users won't be able to execute binaries sitting on these volume. But as soon as one of these binaries is available on a snapshot, it becomes available for the user to execute:

Re: FreeBSD Security Advisory FreeBSD-SA-11:09.pam_ssh

2012-01-02 Thread Patrick Proniewski
On 30 déc. 2011, at 14:10, Fabian Wenk wrote: > Hello Patrick > > On 29.12.2011 21:06, Patrick Proniewski wrote: >>>> No updates needed to update system to 8.1-RELEASE-p7. >>>> >>>> # uname -r 8.1-RELEASE-p5 > >> I have rebooted (twice).

Re: FreeBSD Security Advisory FreeBSD-SA-11:09.pam_ssh

2011-12-29 Thread Patrick Proniewski
On 29 déc. 2011, at 19:56, Xin Li wrote: >> No updates needed to update system to 8.1-RELEASE-p7. >> >> # uname -r 8.1-RELEASE-p5 >> >> any idea? > > Have you restarted your system? I *think* it should say -p6 there > because this batch does not change kernel (last batch did change > kernel bu

Re: FreeBSD Security Advisory FreeBSD-SA-11:09.pam_ssh

2011-12-29 Thread Patrick Proniewski
Hello, On 23 déc. 2011, at 16:36, FreeBSD Security Advisories wrote: > 3) To update your vulnerable system via a binary patch: > > Systems running 7.4-RELEASE, 7.3-RELEASE, 8.2-RELEASE, or 8.1-RELEASE on > the i386 or amd64 platforms can be updated via the freebsd-update(8) > utility: > > # fre

Re: OpenBSM: does somebody work on it?

2011-07-17 Thread Patrick Proniewski
On 17 juil. 2011, at 12:14, Robert Watson wrote: > Just catching up on back e-mail, and bumped into this thread. Did you file > PRs for these bugs? As Stacey mentions, the trustedbsd-audit mailing list is > where most discussion of OpenBSM takes place. It's generally pretty quiet, > but ther

Re: More questions about audit

2011-06-29 Thread Patrick Proniewski
On 29 juin 2011, at 17:11, Lev Serebryakov wrote: > Even more, such command doesn't show anything about user login via > ssh: > > auditreduce -m AUE_login /dev/auditpipe0 | praudit > > Yes, I have "lo" class enabled for all users, and, yes, > > auditreduce -r USER /dev/auditpipe0 | praudit > >

Re: OpenBSM: does somebody work on it?

2011-06-29 Thread Patrick Proniewski
On 29 juin 2011, at 16:23, Lev Serebryakov wrote: > Hello, Patrick. > You wrote 29 июня 2011 г., 16:26:44: > >> I do, almost (I've not finished my settup, but I'm auditing a production >> server). >> May be you'll find this interesting: >> http://forums.freebsd.org/showthread.php?t=23716#9 > It

Re: OpenBSM: does somebody work on it?

2011-06-29 Thread Patrick Proniewski
On 29 juin 2011, at 12:59, Lev Serebryakov wrote: > auditreduce doesn't filter events by date (-b/-a/-d options with any > arguments produces empty output), it doesn't merge files properly and > doesn't pick up files automagically, as Solaris' one does. It doesn't > have -C/-M/-O functionality of

Re: limiting pop access to gmail servers ?

2011-05-01 Thread Patrick Proniewski
Hello, On 02 mai 2011, at 00:55, George Sanders wrote: > BUT, I suspect there are a LOT of possible IPs that google will use to pop > mail > from us ... You are right about that. According to my pop logs, my servers have encounter about 1000 different IPs from google (920 actually). Domain n

Re: pf rules

2010-01-22 Thread Patrick Proniewski
On 22 janv. 10, at 08:50, kalin m wrote: how is it possible that if i have these rules below in pf.conf if i do: telnet that.host.org 25 i get: Trying xx.xx.xx.xx... Connected to that.host.org. Escape character is '^]'. ... etc ... quite strange. What does `pfctl -s all` retur

Re: openssh concerns

2009-10-02 Thread Patrick Proniewski
This will provide the greatest relief against drive-by ssh probes, which are pretty much background radiation these days. Some may decry it as 'security by obscurity', but who cares when it works so effectively :) against script kiddies and bots, obscurity is good. http://en.wikipedia.org/w

Re: A new kind of security needed

2008-07-17 Thread Patrick Proniewski
On 17 juil. 08, at 08:24, Jason Stone wrote: Is anyone else nervous trusting all his programs to have access to all his files? Is there already a reasonable solution to this problem? It makes me nervous for, say, Firefox and its plugins to be able to read and write every file I own, wheth

Re: Sandboxing

2006-11-09 Thread Patrick Proniewski
On 9 nov. 06, at 09:17, mal content wrote: man jail(8) A full jail is quite extreme, don't you think? Besides, it'd be tricky to allow a jailed program to write to ~/.mozilla and /tmp. a full jail is for beginners ;) You can jail a program with only minimum /dev/ and libs, like it was d

Re: mac_bsdextended log information

2006-06-02 Thread Patrick Proniewski
On 2 juin 06, at 10:57, Kenyeres Márton wrote: www kernel: mac_bsdextended: 80:80 request 256 on 0:0 failed. $ find -inum 256 / I'm not sure it's an inode, it might be a rule number (like for a firewall in fact). But it's just a guess. And may be the file name is to be found in apache's

Re: On what versions of FreeBSD can we unreserve ports?

2006-05-27 Thread Patrick Proniewski
On 27 mai 2006, at 15:51, Ian G wrote: On which versions of FreeBSD is it now possible to un-reserve ports? host$ sysctl net.inet.ip.portrange.reservedhigh=0 According to freebsd web site, it has first came with 5.1R (http:// www.freebsd.org/releases/5.1R/relnotes-i386.html). By the way,