Re: src/etc/rc.firewall simple ${fw_pass} tcp from any to any established

2006-11-11 Thread R. B. Riddick
--- Dan Lukes <[EMAIL PROTECTED]> wrote: > Statefull rules can stop the sophisticated intruder, but are often more > vulnerable to DoS attacks. > > Every method has pros and cons ... > Hmm... U mean, when someone creates a lot of states? At least pf can limit that... But here it look

Re: src/etc/rc.firewall simple ${fw_pass} tcp from any to any established

2006-11-11 Thread R. B. Riddick
--- "Julian H. Stacey" <[EMAIL PROTECTED]> wrote: > I tried adding > ${fwcmd} add pass tcp from any to any established > from src/etc/rc.firewall case - simple. Which solved it. > But I was scared, not undertstand what the established bit did, & > how easily an attacker might fake something,

Re: ports / www/linux-seamonkey / flashplugin vulnerability

2006-09-13 Thread R. B. Riddick
--- "Simon L. Nielsen" <[EMAIL PROTECTED]> wrote: > On 2006.09.13 02:54:47 -0700, R. B. Riddick wrote: > > Hi! > > > > Since linux-flashplugin7 r63 is vulnerable according to > > http://vuxml.FreeBSD.org/7c75d48c-429b-11db-afae-000c6ec775d9.html >

ports / www/linux-seamonkey / flashplugin vulnerability

2006-09-13 Thread R. B. Riddick
Hi! Since linux-flashplugin7 r63 is vulnerable according to http://vuxml.FreeBSD.org/7c75d48c-429b-11db-afae-000c6ec775d9.html isn't www/linux-seamonkey vulerable, too (it seems to include 7 r25)? Bye Arne __ Do You Yahoo!? Tired of spam? Yahoo!

Re: comments on handbook chapter

2006-09-08 Thread R. B. Riddick
--- Bigby Findrake <[EMAIL PROTECTED]> wrote: > On Wed, 6 Sep 2006, Travis H. wrote: > > Wouldn't it be better to detect /and/ prevent an attempt to change the > > system binaries? > > That's how I interpret that passage from the handbook - that you should > detect *and* prevent. I'm not clear o

Re: Getting GELI Keys from Floppy

2006-09-07 Thread R. B. Riddick
--- Jack Barnett <[EMAIL PROTECTED]> wrote: > One idea is having 1 server with a CD-ROM drive and exporting it via NFS. > When a server boots it mounts the remote CD-ROM drive and looks for key > "$HOSTNAME.key". > But then u would have the problem with network security... > > On 9/6/06, Barkley V

Re: Getting GELI Keys from Floppy

2006-09-07 Thread R. B. Riddick
--- Bob Johnson <[EMAIL PROTECTED]> wrote: > On 9/6/06, Barkley Vowk <[EMAIL PROTECTED]> wrote: > > You are a complete madman. You want to protect your data with a key stored > > on the most completely and utterly unreliable form of data storage still > > lamentably in use? Its not the 1970's anymo

Re: seeding dev/random in 5.5

2006-08-09 Thread R. B. Riddick
--- fwaggle <[EMAIL PROTECTED]> wrote: > i have a question. perhaps i'm misunderstanding something with how SSH > works, but how would having a "standard freebsd private key" benefit > anyone? if you wanted to impersonate a newly installed freebsd machine, > then all you'd need is that freely-av

Re: seeding dev/random in 5.5

2006-08-09 Thread R. B. Riddick
--- Brooks Davis <[EMAIL PROTECTED]> wrote: > On Wed, Aug 09, 2006 at 12:17:35AM -0700, R. B. Riddick wrote: > These are valid if probably overly paranoid points. :) > Hmm... Oki Doke... But why use ssh, if u do not really care, if u connect to the right host? Maybe the postmen k

Re: seeding dev/random in 5.5

2006-08-09 Thread R. B. Riddick
--- Doug Barton <[EMAIL PROTECTED]> wrote: > The patches you sent to implement this option didn't come through to the > mailing list, could you resend them please? :) > > Seriously though, a lot of people looked at this problem when yarrow was > introduced, and no solution became immediately appar

Re: seeding dev/random in 5.5

2006-08-08 Thread R. B. Riddick
--- Michael Scheidell <[EMAIL PROTECTED]> wrote: > This would affect the generic stock 5.5 install disk as well (it doesn't > create new keys when it builds a virgin hard disk) > If a user just hits return, there is no error message, no indication > that /dev/random wasn't seeded. > > We have a bo

Re: seeding dev/random in 5.5

2006-08-08 Thread R. B. Riddick
--- Michael Scheidell <[EMAIL PROTECTED]> wrote: > R. B. Riddick wrote: > > Why do u believe, that /dev/random isnt seeded by networking? > > > > > because it isn't. > and pings arn' going to produce much random data. > Hmm... Interesting... >

Re: seeding dev/random in 5.5

2006-08-08 Thread R. B. Riddick
--- Michael Scheidell <[EMAIL PROTECTED]> wrote: > R. B. Riddick wrote: > > --- Michael Scheidell <[EMAIL PROTECTED]> wrote: > > > >>> I think that during the first reboot after a fresh install > >>> the kern.random.sys sysctl settings ar

RE: seeding dev/random in 5.5

2006-08-08 Thread R. B. Riddick
--- Michael Scheidell <[EMAIL PROTECTED]> wrote: > > I think that during the first reboot after a fresh install > > the kern.random.sys sysctl settings are already orderly > > before rc.d/sshd is called... > > > > If yes, then sending some pings should do the trick... Or > > not? I mean: NETWOR

Re: seeding dev/random in 5.5

2006-08-08 Thread R. B. Riddick
--- Michael Scheidell <[EMAIL PROTECTED]> wrote: > I was doing some regression testing in 5.5: Specifically testing booting > up a 'virgin' hard disk from a clean install. > > I was testing what happened if the 300 second timeout happened vs > hitting for 'fast+insecure' startup and punching in a

Re: Any ongoing effort to port /etc/rc.d/pf_boot, /etc/pf.boot.conf from NetBSD ?

2006-07-16 Thread R. B. Riddick
--- Ari Suutari <[EMAIL PROTECTED]> wrote: > On FreeBSD 6.1, run rcorder /etc/rc.d/*. You'll notice that > pf is run after netif so if one is using only pf as firewall, > there is a window between run of "netif" and "pf" where network > interfaces are up but there is no fire

Re: Integrity checking NANOBSD images

2006-07-11 Thread R. B. Riddick
--- Mike Tancsa <[EMAIL PROTECTED]> wrote: > >But what if the trojan copies its files to the RAM disc and waits for this > >sha256 binary showing up? And then, when it is there, it removes its > >changes on > >the hard disc (those changes certainly must be in unused (formerly zeroed) > >areas of

Re: Integrity checking NANOBSD images

2006-07-11 Thread R. B. Riddick
--- Chuck Swiger <[EMAIL PROTECTED]> wrote: > That suggestion is a very good point, although trying to find a single > trojaned image which matches several checksum methods is supposed to be a > highly difficult task. > If the hash function is cryptographically secure, even a single such hash fu

Re: Integrity checking NANOBSD images

2006-07-11 Thread R. B. Riddick
--- Poul-Henning Kamp <[EMAIL PROTECTED]> wrote: > Arming a trojan to just do 'sleep 145 ; echo "sha256 = 0248482..."' > when you thing you're running sha256 would be trivia. > But what if the trojan copies its files to the RAM disc and waits for this sha256 binary showing up? And then, when it is

Re: memory pages nulling when releasing

2006-06-19 Thread R. B. Riddick
--- Nick Borisov <[EMAIL PROTECTED]> wrote: > 2006/6/19, R. B. Riddick <[EMAIL PROTECTED]>: > > It was possible to transfer about 20MB of data over about > > one hour from a single IP, that was never seen there before... > > Well, you are not goin' to say

Re: memory pages nulling when releasing

2006-06-19 Thread R. B. Riddick
--- Nick Borisov <[EMAIL PROTECTED]> wrote: > [...] Allowing an intrunder to deal with your > system even one extra minute may lead to tremendous losses depending > [...] > :-) OK.. Let's see, if I understood this right: 1 minute <-could be-> 1 tremendous loss 50 minutes <-could be-> 50 tremendous

Re: memory pages nulling when releasing

2006-06-19 Thread R. B. Riddick
--- Dan Lukes <[EMAIL PROTECTED]> wrote: > [...] Thus, keeping sensitive informations within memory for short > time only MAY reduce the risk level. The intruder need wait for > information to appear in memory again - but it cost time. [...] > That is true - it costs time... But if a bad guy ha

Re: memory pages nulling when releasing

2006-06-19 Thread R. B. Riddick
--- Dag-Erling Smørgrav <[EMAIL PROTECTED]> wrote: > "R. B. Riddick" <[EMAIL PROTECTED]> writes: > > (bb) physical access (for reading the content of powered off RAM) > > You cannot read the content of powered-off DRAM. > Yes, that it is true. _I_ cannot r

Re: memory pages nulling when releasing

2006-06-18 Thread R. B. Riddick
--- Nick Borisov <[EMAIL PROTECTED]> wrote: > Well, providing zeroed pages to processes is not quite similar to > explicit cleaning of pages after use as some security standards > demand. That's why I'm asking. The "Z" malloc option seems to be > suitable but it's actually for debugging. > Since yo

Re: memory pages nulling when releasing

2006-06-18 Thread R. B. Riddick
--- Nick Borisov <[EMAIL PROTECTED]> wrote: > Could you tell me if FreeBSD supports memory page nulling when > releasing it to prevent unauthorized access to data left in the page > after it's allocated again. > If it does, what sys calls etc provide that? > IMHO this is an important issue when ope

RE: Jails and loopback interfaces

2006-05-04 Thread R. B. Riddick
--- "[EMAIL PROTECTED]@mgEDV.net" <[EMAIL PROTECTED]> wrote: > this part i definitely don't get. let's assume this one: > > 192.168.10.1 = jail ip of the ws > 127.0.0.1 = jail ip of the db > sending to 127.0.0.1 is not possible on 192.168.134.1 (kernel > re-routes it to 192.168.134.1 if man jail i

Re: Looking for tor users experiencing crashes

2006-05-01 Thread R. B. Riddick
--- Robert Watson <[EMAIL PROTECTED]> wrote: > It's a pity this wasn't brought to my attention sooner, or there might have > been a chance to work on it for 6.1-RELEASE, especially given that it sounds > like it has been a moderately long-standing problem. The first I heard about > I can crash

Re: IPFW Problems?

2006-04-17 Thread R. B. Riddick
--- Noah Silverman <[EMAIL PROTECTED]> wrote: > Take the following rules: > ipfw add 00280 allow tcp from any to any 22 out via bge0 setup keep- > state > ipfw add 00299 deny log all from any to any out via bge0 > ipfw add 0430 allow log tcp from any to me 22 in via bge0 setup limit > src-addr 2

Re: Question about Export Restrictions

2006-04-13 Thread R. B. Riddick
Tom <[EMAIL PROTECTED]> writes: > I work for a company that builds an appliance based on FreeBSD > (4.X) and we've just had our first question come up about exporting > the appliance out of the US (specifically the EU). > > Since FreeBSD uses OpenSSL/OpenSSH, I'm under the impression > that we nee