Re: tcpdump -z

2010-08-27 Thread Pieter de Boer
On 08/27/2010 04:27 PM, István wrote: Well to be honest i don't see any case when i want to give sudo+tcpdump access to any user on my box. And those who are admins/roots anyway the "su -" just works perfectly and they can run tcpdump. I simply change the permissions on /dev/bpf* so that some mo

Re: tcpdump -z

2010-08-27 Thread Pieter de Boer
On 08/27/2010 10:32 AM, Vadim Goncharov wrote: This is a froward message from tcpdump-workers mail list: === 8< >8 === $ sudo ./tcpdump -i any -G 1 -z ./test.sh -w dump port 5 [sudo] password for user: tcpdump: listening on any, link-type LINUX_SLL (Linux cooked), capture si

Re: FreeBSD Security Advisory FreeBSD-SA-09:16.rtld

2009-12-03 Thread Pieter de Boer
Jamie Landeg Jones wrote: > > However, I'd still apply the patch in case some other way to exploit > the non-checking of the unsetenv return status crops up elsewhere. > > It can't do any harm. The problem with that is, on 6.x, unsetenv() returns 'void', so there's no return value to check on.

Re: Fwd: FreeBSD Security Advisory FreeBSD-SA-09:13.pipe

2009-10-02 Thread Pieter de Boer
Jon Passki wrote: > Has the FreeBSD Secteam tested setting VM_MIN_ADDRESS to some high > number such as 65536? This does not fix the vulnerability per se, but > one would hope it stops a user mapping code to 0x0. > See the FreeBSD-EN-09:05.null erratum that contains a patch that allows you to do t

Re: Protecting against kernel NULL-pointer derefs

2009-09-18 Thread Pieter de Boer
Julian wrote: > The assumption is that the userland and kernel share a memory map. > While we do implement it this way, it is not necessarily needed. > We do it for performance reasons (each user memory map includes an > identical top section that is the kernel space, so that we do not need > to sw

Re: Protecting against kernel NULL-pointer derefs

2009-09-15 Thread Pieter de Boer
Dag-Erling Smørgrav wrote: 'amount' => 2, 'of late' is more figure of speech than anything else. For me, amount was high enough to get interested and 'of late' may be because I've not been looking long enough. A search of FreeBSD security advisories shows two in the last four years, plus the c

Re: Protecting against kernel NULL-pointer derefs

2009-09-15 Thread Pieter de Boer
Dag-Erling Smørgrav wrote: Given the amount of NULL-pointer dereference vulnerabilities in the FreeBSD kernel that have been discovered of late, Specify "amount" and define "of late". 'amount' => 2, 'of late' is more figure of speech than anything else. For me, amount was high enough to get in

Protecting against kernel NULL-pointer derefs

2009-09-15 Thread Pieter de Boer
All, Given the amount of NULL-pointer dereference vulnerabilities in the FreeBSD kernel that have been discovered of late, I've started looking at a way to generically protect against the code execution possibilities of such bugs. By disallowing userland to map pages at address 0x0 (and a bit be

Re: OpenSSL DoS/PoC in milw0rm

2009-06-04 Thread Pieter de Boer
Oliver Pinter wrote: > the base system contins 0.9.8e and this PoC is affected up to 0.9.8i > not yet tested > the question is, the freebsd is affected for this error/malware/poc? > http://milw0rm.com/exploits/8873 (term1) OpenSSL> version OpenSSL 0.9.8e 23 Feb 2007 % openssl s_server -cert /usr

Re: Dropping syn+fin replies, but not really?

2008-11-24 Thread Pieter de Boer
Hi Eirik, Perform the nmap scan and look at the tcpdump output to see how your firewall and/or server react. nmap command: nmap -PN -sT --scanflags SYNFIN -p anduin.net where was either 80 (open) or 8585 (closed). tcpdump command on firewall (which NATs to internal IPs): tcpdump -i -p -vvv

Re: Dropping syn+fin replies, but not really?

2008-11-23 Thread Pieter de Boer
Eirik Øverby wrote: I have a FreeBSD based firewall (pfsense) and, behind it, a few dozen FreeBSD servers. Now we're required to run external security scans (nessus++) on some of the hosts, and they constantly come back with a "high" or "medium" severity problem: The host replies to TCP packet

Re: kern.chroot_allow_open_directories

2007-07-19 Thread Pieter de Boer
Stef Walter wrote: The chroot(2) man page describes a sysctl called 'kern.chroot_allow_open_directories' which controls whether a process can chroot() and is already subject to the chroot() syscall. It seems that this sysctl can be trivially changed from within a chroot'd process (ie: if that p

Re: SSH scans vs connection ratelimiting

2006-08-29 Thread Pieter de Boer
Just to put an end to this sillyness :) A few days ago, I wrote: For months now, we're all seeing repeated bruteforce attempts on SSH. I've configured my pf install to ratelimit TCP connections to port 22 and to automatically add IP-addresses that connect too fast to a table that's filtered:

Re: SSH scans vs connection ratelimiting

2006-08-20 Thread Pieter de Boer
Constantine A. Murenin wrote: So, my question is: Does anyone know how this particular attack works and if there's a way to stop this? If my theory is sound and OpenSSH does not have provisions to limit the authentication requests per TCP session, I'd find that an inadequacy in OpenSSH, but I'm

Re: SSH scans vs connection ratelimiting

2006-08-20 Thread Pieter de Boer
Lyndon Nerenberg wrote: Take a look at /usr/ports/security/bruteforceblocker. It monitors the system log for failed ssh logins, and blocks the sites via pf. It's reasonably configurable, and works very well. I've been running it for months without trouble. I've written a similar script which

Re: SSH scans vs connection ratelimiting

2006-08-20 Thread Pieter de Boer
Scot Hetzel wrote: However, there apparently are SSH bruteforcers that simply use one connection to perform a brute-force attack: Aug 18 00:00:01 aberdeen sshd[87989]: Invalid user serwis from 83.19.113.122 Aug 18 00:00:03 aberdeen sshd[88010]: Invalid user serwis from 83.19.113.122 Aug 18 00

SSH scans vs connection ratelimiting

2006-08-19 Thread Pieter de Boer
Gang, For months now, we're all seeing repeated bruteforce attempts on SSH. I've configured my pf install to ratelimit TCP connections to port 22 and to automatically add IP-addresses that connect too fast to a table that's filtered: table { } block quick from to any pass in quick on $e