Re: Review of FreeBSD Security Advisory Process: Incl Heads Up, Dates, Etc [cont: 5599 SACK}

2019-07-04 Thread Peter Jeremy
under Project control - where a vulnerability affects multiple vendors, there is almost always general agreement on a common announcement date. If the Project leaks information about unannounced vulnerabilities, it will stop receiving advance information about vulnerabilities - this definitely

Re: Need FreeBSD-SA-00:52(TCP uses weak initial sequence numbers) latest patch

2018-01-11 Thread Peter Jeremy
fix in 10,4 kernel. That code was re-written in r82122, retaining the use of arc4random() for ISN initialisation. As a result, it's no longer possible to point at specific code and say "that code fixes weak TCP ISNs". -- Peter Jeremy signature.asc Description: PGP signature

Re: Need FreeBSD-SA-00:52(TCP uses weak initial sequence numbers) latest patch

2018-01-11 Thread Peter Jeremy
22 so the code no longer exists in that form. Please advise what problem you believe still exists in FreeBSD 10.4. -- Peter Jeremy signature.asc Description: PGP signature

Re: Response to Meltdown and Spectre

2018-01-11 Thread Peter Jeremy
rary virtual address. An attacker could import code from another system so it's not possible to mitigate the vulnerability by (eg) implementing bounds checking in a compiler. -- Peter Jeremy signature.asc Description: PGP signature

Re: The Stack Clash vulnerability

2017-06-22 Thread Peter Jeremy
n January 2014, so you have had 3½ years to resolve the problem that your servers aren't compatible with 10.x. >Not asking for new versions or new releases.. just patches applied for >previous -STABLE trees As has been stated, the FreeBSD project will patch the supported -STA

Re: fbsd11 & sshv1

2017-02-01 Thread Peter Jeremy
need for a SSHv1 client creates a net/ssh1 port (ie not in the "security" category) that installs a client (only) that supports SSHv1 only, and comes with a big red flashing "DANGER: INSECURE, DO NOT USE UNLESS YOU KNOW WHAT YOU ARE DOING" warning. -- Peter Jeremy signature.asc Description: PGP signature

Re: FreeBSD Security Advisory FreeBSD-SA-16:26.openssl

2016-09-23 Thread Peter Jeremy
ones were correct). -- Peter Jeremy signature.asc Description: PGP signature

Re: FreeBSD Security Advisory FreeBSD-SA-15:12.openssl

2015-07-09 Thread Peter Jeremy
't in the r284295 cherry-pick. -- Peter Jeremy pgp2yPIu85W4Q.pgp Description: PGP signature

Re: Leap Second

2015-07-01 Thread Peter Jeremy
pd(8) has provision for specifying a leapsecond file which presumably makes it leap-second aware. I haven't looked into the details. There's also posix2time(3) to convert between a TAI-based time_t and a POSIX-based time_t. -- Peter Jeremy pgpHbANjcdE5S.pgp Description: PGP signature

Re: Leap Second

2015-06-23 Thread Peter Jeremy
On 2015-Jun-24 07:21:28 +1000, Peter Jeremy wrote: >The closest is the LEAPSECONDS option: If LEAPSECONDS is defined at build >time, /usr/src/contrib/tzdata/leapseconds is baked into the individual >timezone files (to be) installed into /usr/share/zoneinfo. It seems that the tzdata fil

Re: Leap Second

2015-06-23 Thread Peter Jeremy
On 2015-Jun-23 22:00:49 +0100, Pawel Biernacki wrote: >On 23 June 2015 at 21:56, Peter Jeremy wrote: > >> On 2015-Jun-23 20:03:35 +0100, Pawel Biernacki >> wrote: >> >As we (hopefully) all know on 30th of June we'll observe leap second. >> > tzdata in

Re: Leap Second

2015-06-23 Thread Peter Jeremy
on with update to share/zoneinfo/leap-seconds.list file. None of my FreeBSD systems have a share/zoneinfo/leap-seconds.list file. Why should the Project issue an EN for a non-existent file? -- Peter Jeremy pgpJJchdxWJlN.pgp Description: PGP signature

Re: Strange package checksum report

2015-01-24 Thread Peter Jeremy
pyc files at package install time. As far as I can see, this is what Ubuntu and Debian (the two Linux distros I have ready access to) do. >(Would slow down builds of dependent packages, but those are the >breaks.) It would be interesting to know how big an impact this is. -- Peter Jeremy pgpOFZRKGD3uH.pgp Description: PGP signature

Re: FreeBSD needs Git to ensure repo integrity [was: 2012 incident]

2012-11-20 Thread Peter Jeremy
ned by a recognised CA. The hashes of the >certificate keys are on the mirror website I pointed out in my email The certificates are self-signed. Whilst the hashes are published on the FreeBSD website, that site is only available via HTTP so there's still a bootstrap issue - which I don't have a general solution for. -- Peter Jeremy pgpNni5WnFFmA.pgp Description: PGP signature

Re: svn commit: r239569 - head/etc/rc.d

2012-09-06 Thread Peter Jeremy
orm and will typically run at >>100MHz. In order to reproduce the state, you need to feed the same input in with sub-microsecond timing. And this all occurs well before user logins are allowed. If you have an attacker that can tightly control what happens during early system startup, you have more serious problems than the amount of entropy in /dev/random. -- Peter Jeremy pgpY5da166SDY.pgp Description: PGP signature

Re: svn commit: r239598 - head/etc/rc.d

2012-09-06 Thread Peter Jeremy
On 2012-Sep-06 02:09:34 +0100, RW wrote: >On Thu, 6 Sep 2012 07:27:34 +1000 >Peter Jeremy wrote: >> Is it worth splitting harvestfifo into multiple queues to prevent >> this? At least a separate queue for RANDOM_WRITE and potentially >> separate queues for each entropy so

Re: svn commit: r239598 - head/etc/rc.d

2012-09-05 Thread Peter Jeremy
within the kernel) being discarded. There would still be a small amount of entropy from the get_cyclecount() calls but this is minimal. Is it worth splitting harvestfifo into multiple queues to prevent this? At least a separate queue for RANDOM_WRITE and potentially separate queues for eac

Re: svn commit: r239598 - head/etc/rc.d

2012-09-05 Thread Peter Jeremy
it does so in a predictable way so it doesn't add any entropy. On the downside, it doesn't appear to be possible to queue more than 4KB of input every 100msec - excess input is just discarded. This implies that feeding boilerplate into /dev/random just increases the probability that r

Re: svn commit: r239569 - head/etc/rc.d

2012-09-04 Thread Peter Jeremy
e to get a round >'tuit.) You might like to look at kern/134225 (which is misfiled, sorry). -- Peter Jeremy pgp9XYONOHZxL.pgp Description: PGP signature

Re: getting the running patch level

2012-08-20 Thread Peter Jeremy
des provision for displaying information prior to login - see the "Banner" option in sshd_config. Note that this is most definitely the wrong place to include system version details. -- Peter Jeremy pgpFqMq1LTlO2.pgp Description: PGP signature

Re: Merry Christmas from the FreeBSD Security Team

2011-12-23 Thread Peter Jeremy
y team. Thanks for your efforts during 2011 and I hope you have a quiet and uneventful holiday period and 2012. -- Peter Jeremy pgpvKbjvy3cxc.pgp Description: PGP signature

Re: logging _rtld errors

2011-12-19 Thread Peter Jeremy
th them. > FWIW, it should use rtld_printf() instead of printf(), >but this is moot point. Accepted. On 2011-Dec-19 21:02:49 +0100, Clément Lecigne wrote: >Dont know but the ld_printerror != '\0' in the patch should be >*ld_printerror != '\0', no? Oops, my mistake. Yes

Re: SSL is broken on FreeBSD

2011-04-04 Thread Peter Jeremy
root cert and distribute that with FreeBSD. That certificate would at least have the same trust level as FreeBSD. -- Peter Jeremy pgp6JsnJdHcJo.pgp Description: PGP signature

Re: It's not possible to allow non-OPIE logins only from trusted networks

2011-03-13 Thread Peter Jeremy
memorise the lowest N and response. -- Peter Jeremy pgpzftFfptj93.pgp Description: PGP signature

Re: portaudit

2010-07-26 Thread Peter Jeremy
Alternatively, you could follow the reference links and determine whether the particular vulnerabilities apply to your particular situation. This obviously requires a greater level of skill and reviewing if the situation changes. -- Peter Jeremy pgpAoAdrgOz4B.pgp Description: PGP signature

Re: online cheksum verification for FreeBSD

2010-03-10 Thread Peter Jeremy
s and is not recommended for new applications. This is why FreeBSD has moved to using a combination of MD5 and SHA256. Also, your website mentions DSA is unsafe. Could you please provide a reference for this claim as I am unaware of any results suggesting that DSA is less secure than RSA. -- Peter Jeremy pgpxfWXP1FEFO.pgp Description: PGP signature

Re: OPIE considered insecure

2009-02-11 Thread Peter Jeremy
G, NextG etc) to communicate with your systems. Note that using very large sequence numbers should slow down an attacker (though only linerarly) since they still need to iterate MD5 by that many rounds. -- Peter Jeremy pgpO5m4qUmf47.pgp Description: PGP signature

Re: MD5 vs. SHA1 hashed passwords in /etc/master.passwd: can we configure SHA1 in /etc/login.conf?

2009-01-06 Thread Peter Jeremy
to >change the md5-algorithm by default towards sha1 as recommended after >the md5-collisions has been published? Note that both MD5 and SHA1 are broken in the cryprographic sense. As various people have noted, the known breaks do not impact on MD5 password hashes. -- Peter Jeremy Please

Re: OPIE Challenge sequence

2008-07-09 Thread Peter Jeremy
o generate random challenges using opiechallenge No. The seed has to match the seed that was used to generate the hash with opiepasswd. -- Peter Jeremy Please excuse any delays as the result of my ISP's inability to implement an MTA that is either RFC2821-compliant or matches their claimed beh

Re: post-reload SSH server key transfer ... comments ?

2007-02-05 Thread Peter Jeremy
t to copy the remaining files. In particular, you should merge your local changes to /etc/ssh/ssh{,d}_config because just copying those files across is quite likely to give the newer ssh a degree of indigestion. -- Peter Jeremy pgpStG3V5YukL.pgp Description: PGP signature

Re: What about BIND 9.3.4 in FreeBSD in base system ?

2007-02-02 Thread Peter Jeremy
upported" version of the software. The FreeBSD SO has advised that 5.x will receive security updates until 31 May 2008. This gives you 15 months to either migrate to 6.x (or 7.x) or arrange alternative security support. -- Peter Jeremy pgpkJeH4Igp4V.pgp Description: PGP signature

Re: What about BIND 9.3.4 in FreeBSD in base system ?

2007-01-30 Thread Peter Jeremy
ug's suggestion that not MFCing bind 9.3.4 to RELENG_5 is an incentive to upgrade to 6.x). -- Peter Jeremy pgp59Aryg16r5.pgp Description: PGP signature

Re: UDP connection attempts

2006-07-19 Thread Peter Jeremy
user has new mail but you aren't running biff. To stop it, add the following lines to your sendmail.mc file, rebuild sendmail.cf and restart sendmail: dnl Disable biff notification define(`LOCAL_MAILER_ARGS', `mail.local -Bl') -- Peter Jeremy pgpzGx8OtFw34.pgp Description: PGP signature

Re: memory pages nulling when releasing

2006-06-19 Thread Peter Jeremy
atisfy a pagein request. FreeBSD tries to reduce the effective overhead of page zeroing by zeroing them in the idle loop and keeping a cache of pre-zeroed pages for handing out to processes. -- Peter Jeremy pgpQP35QW4vB2.pgp Description: PGP signature

Re: FreeBSD Security Survey

2006-05-23 Thread Peter Jeremy
On Tue, 2006-May-23 08:53:00 -0700, Roger Marquis wrote: >Peter Jeremy wrote: >>One of the major problems with unattended/automatic updating is >>that it is hard to filter them. Actually, I didn't. -- Peter Jeremy ___ freebsd-

Re: FreeBSD Security Survey

2006-05-22 Thread Peter Jeremy
ate process needs to balance the benefits of reducing the number of unpatched boxes against the risks of the update system being subverted. -- Peter Jeremy ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: Slightly OT: SSL certs - best practice?

2006-05-16 Thread Peter Jeremy
on that? I've gone through the CAcert assurance process and it seems to work, though a lot depends on your access to other assurers. Note that the CAcert certificates are now part of ports/security/ca-roots though the issue of bootstrapping remains (how do you know that your roots file is gen

Re: Should I use gbde or geli?

2006-01-29 Thread Peter Jeremy
On Sun, 2006-Jan-29 12:10:34 +0100, Christian Baer wrote: >On Sun, 29 Jan 2006 13:29:43 +1100 Peter Jeremy wrote: >I am reading up on the basics of this subject. However, the theory >doesn't really cover too much of the practical sides like the real >differences between approaches

Re: Should I use gbde or geli?

2006-01-28 Thread Peter Jeremy
omputer without setting off the alarm. You might find it easier to protect the master keys with a (volatile) passphrase and rely on adequate protection of the passphrase. (You might also consider looking up "secret sharing" "threshold system"). >After considering this, am I b

Re: Reflections on Trusting Trust

2005-11-30 Thread Peter Jeremy
since the >attacker controls too much, or you can say the probability is high >enough that you got a copy of the original repository. This is non-trivial because the repository is not static and CVS doesn't store transaction logs that would allow you to reproduce the r

Re: Reflections on Trusting Trust

2005-11-30 Thread Peter Jeremy
On Wed, 2005-Nov-30 14:38:11 -0500, Kris Kennaway wrote: >On Thu, Dec 01, 2005 at 04:58:36AM +1100, Peter Jeremy wrote: > >> Note that the only ports-related file that can't be moved out of the >> ports tree is 'INDEX'. > >Set INDEXFILE. INDEXFILE always app

Re: Reflections on Trusting Trust

2005-11-30 Thread Peter Jeremy
org security: If you don't trust the FreeBSD Project you wouldn't run FreeBSD. > Without ssh access there's no way to insert a key into the CVS >repository. Assuming no security holes in the infrastructure... How can I tell that my private copy of the FreeBSD Pro

Re: Reflections on Trusting Trust

2005-11-30 Thread Peter Jeremy
roam >around in /etc. And, hence, require root privileges. >BTW, those scripts fail (of course), if /tmp is mounted with the noexec >option. I think the solution to this is to set PKG_TMPDIR somewhere else. -- Peter Jeremy ___ freebsd-secur

Re: Reflections on Trusting Trust

2005-11-29 Thread Peter Jeremy
is closer to the X.509 model. The base system already includes tools for handling X.509 signatures (openssl) and there is already a collection of X.509 keys embedded in the ports system (security/ca-roots). -- Peter Jeremy ___ freebsd-security@freebsd.org m

Re: Reflections on Trusting Trust

2005-11-27 Thread Peter Jeremy
ment from the mailing list archive (http://lists.freebsd.org/pipermail/freebsd-announce/2005-November/001023.html). Whilst the signature was still intact, the content has been changed so the signature no longer verifies. (The changes are presumably mechanical changes as part of its conversion from

Reflections on Trusting Trust

2005-11-26 Thread Peter Jeremy
te obtaining a X.509 certificate for the FreeBSD Project - Signing ISO images with a Project key and/or certificate in addition to providing MD5 checksums. - Investigate providing authenticated protocols for updating FreeBSD. -- Peter Jeremy pgpjIjOjnnn1g.pgp Description: PGP signature

Re: Need urgent help regarding security

2005-11-21 Thread Peter Jeremy
on it as your only security. But, IMHO, it is worth doing in addition to other security measures. -- Peter Jeremy ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Re: Need urgent help regarding security

2005-11-17 Thread Peter Jeremy
tions of them. I strongly recommend that you disable reusable passwords on any system exposed to the Internet - RSA/DSA or OPIE are much harder to brute force. You can also use AllowUsers to further limit exposure. -- Peter Jeremy ___ freebsd-security@fr

Re: Is it feasible to cross-build compat5x binary?

2005-10-24 Thread Peter Jeremy
1). We can probably leverage off the work that NetBSD has done in this area. This would significantly simplify the work involved in supporting the various architectures. -- Peter Jeremy ___ freebsd-security@freebsd.org mailing list http://lists.

Re: FreeBSD Security Advisory FreeBSD-SA-05:21.openssl

2005-10-12 Thread Peter Jeremy
through the documentation and can't find any reference to a runtime OpenSSL configuration file that would let me do this. -- Peter Jeremy ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To un

Re: FreeBSD Security Advisory FreeBSD-SA-05:21.openssl

2005-10-12 Thread Peter Jeremy
On Wed, 2005-Oct-12 00:12:35 -0700, Arne Wörner wrote: >Btw: Why should the string "OpenSSL" be contained in each and >every executable, that might use OpenSSL? OpenSSL has a version string of the form "OpenSSL 0.9.7e 25 Oct 2004" embedde

Re: Will 5.4 be an "Extended Life" release?

2005-04-26 Thread Peter Jeremy
; long-term-supported. I'm sure one of the two will, as one of the two will >> reflcet ultimately the walk-of-life of 5-STABLE, won't it? > >Why don't we just skip 6 and name it "FreeBSD X" or "FreeBSD 10" ? Why not just merge XFree86 (or X.

Re: FreeBSD trusted execution system: beta testers wanted

2005-03-12 Thread Peter Jeremy
ile~ Fri Mar 11 14:09:20 2005 +++ MakefileSun Mar 13 09:56:42 2005 @@ -1,5 +1,5 @@ -.PATH: /usr/src/sys/crypto/ -CFLAGS+= -I/usr/src/sys/crypto +.PATH: ${.CURDIR}/../../crypto +CFLAGS+= -I${.CURDIR} -I${.CURDIR}/../../crypto KMOD= mac_chkexec SRCS= vnode_if.h \ server# -