CLOSED: Re: security: wted?

2025-02-26 Thread home user via users
On 2/13/25 10:50 AM, home user via users wrote: (f40; gnome; last patched minutes ago) When I ran chkrootkit, I got the following (including a few lines of context) regarding "wted": - - - - - - [snip] Checking `w55808'... not infected Checking `wted'... 1 deletion(s) between Tue Jan 28 07:33:4

Re: security: wted?

2025-02-22 Thread Stephen Morris
On 14/2/25 10:17, home user via users wrote: On 2/13/25 3:11 PM, home user via users wrote: On 2/13/25 2:40 PM, Jonathan Billings wrote: On Feb 13, 2025, at 12:51, home user via users wrote: [snip] What is "wted", and is there a security problem? The “wted” function in the chkrootkit scri

Re: security: wted?

2025-02-15 Thread Tim via users
On Fri, 2025-02-14 at 15:24 -0700, home user via users wrote: > I use Firefox. There's that little shield icon just to the left of > the address bar. I'm amazed (and concerned) at how many web sites > that shield "says" are trying to track, cross-site track, and > fingerprint. ...and how many si

Re: security: wted?

2025-02-15 Thread Tim via users
Tim: > > Having said all that, most people don't serve websites from their own > > PC any more, few ISPs allow it. Patrick O'Callaghan: > I do run a small family webserver on my desktop, but I also have > Fail2Ban installed. It registers multiple failed connection attempts > every day, mainly fr

Re: security: wted?

2025-02-14 Thread home user via users
On 2/14/25 9:59 AM, Patrick O'Callaghan wrote: On Sat, 2025-02-15 at 02:19 +1030, Tim via users wrote: Having said all that, most people don't serve websites from their own PC any more, few ISPs allow it. I do run a small family webserver on my desktop, but I also have Fail2Ban installed. It r

Re: security: wted?

2025-02-14 Thread home user via users
On 2/14/25 8:49 AM, Tim wrote: Tim: Is there a reason you feel the need to check for rootkits? I'm under the impression that if you don't install things from outside of the repos, and keep SELinux running, there's a so-close-to-zero chance of you having a problem that it's not worth worrying ab

Re: security: wted?

2025-02-14 Thread Patrick O'Callaghan
On Fri, 2025-02-14 at 14:51 -0700, home user via users wrote: > On 2/14/25 3:49 AM, Patrick O'Callaghan wrote: > > On Thu, 2025-02-13 at 23:32 -0800, Samuel Sieb wrote: > > > Those tools are not going to provide any useful help. > > > > I tend to agree. I've never used either of them and have had

Re: security: wted?

2025-02-14 Thread home user via users
On 2/13/25 11:15 PM, Michael D. Setzer II wrote: On 13 Feb 2025 at 20:39, home user via users wrote: [snip] So looks like 0.58 has some added things. rkhunter seems to have the same version as sourceforge site. Thank-you Michael. My information came from "dnf history" and the tools' website

Re: security: wted?

2025-02-14 Thread home user via users
On 2/14/25 3:49 AM, Patrick O'Callaghan wrote: On Thu, 2025-02-13 at 23:32 -0800, Samuel Sieb wrote: Those tools are not going to provide any useful help. I tend to agree. I've never used either of them and have had no consequences as a result. Linux can have security issues of course, but my

Re: security: wted?

2025-02-14 Thread Patrick O'Callaghan
On Sat, 2025-02-15 at 02:19 +1030, Tim via users wrote: > Having said all that, most people don't serve websites from their own > PC any more, few ISPs allow it.  I do run a small family webserver on my desktop, but I also have Fail2Ban installed. It registers multiple failed connection attempts

Re: security: wted?

2025-02-14 Thread George N. White III
On Fri, Feb 14, 2025 at 11:50 AM Tim via users wrote: > > > Most of the time anti-malware running on Linux was to protect Windows > machines on the same network. Such as scanning incoming mail before > the Windows machines got it. > Decades ago at work many of us had email on IRIX64 or NextStep a

Re: security: wted?

2025-02-14 Thread Tim via users
Tim: > > Is there a reason you feel the need to check for rootkits? > > > > I'm under the impression that if you don't install things from outside > > of the repos, and keep SELinux running, there's a so-close-to-zero > > chance of you having a problem that it's not worth worrying about. hom

Re: security: wted?

2025-02-14 Thread Patrick O'Callaghan
On Thu, 2025-02-13 at 23:32 -0800, Samuel Sieb wrote: > Those tools are not going to provide any useful help. I tend to agree. I've never used either of them and have had no consequences as a result. Linux can have security issues of course, but my feeling is that they are much more likely to come

Re: security: wted?

2025-02-13 Thread Samuel Sieb
On 2/13/25 7:39 PM, home user via users wrote: On 2/13/25 7:33 PM, Tim wrote: On Thu, 2025-02-13 at 10:50 -0700, home user via users wrote: When I ran chkrootkit, I got the following (including a few lines of context) regarding Is there a reason you feel the need to check for rootkits? I'm u

Re: security: wted?

2025-02-13 Thread Michael D. Setzer II via users
On 13 Feb 2025 at 20:39, home user via users wrote: Date sent: Thu, 13 Feb 2025 20:39:23 -0700 Subject:Re: security: wted? To: Community support for Fedora users Send reply to: Community support for Fedora users From

Re: security: wted?

2025-02-13 Thread home user via users
On 2/13/25 7:33 PM, Tim wrote: On Thu, 2025-02-13 at 10:50 -0700, home user via users wrote: When I ran chkrootkit, I got the following (including a few lines of context) regarding Is there a reason you feel the need to check for rootkits? I'm under the impression that if you don't install th

Re: security: wted?

2025-02-13 Thread Tim via users
On Thu, 2025-02-13 at 10:50 -0700, home user via users wrote: > When I ran chkrootkit, I got the following (including a few lines of > context) regarding Is there a reason you feel the need to check for rootkits? I'm under the impression that if you don't install things from outside of the repos,

Re: security: wted?

2025-02-13 Thread home user via users
On 2/13/25 3:11 PM, home user via users wrote: On 2/13/25 2:40 PM, Jonathan Billings wrote: On Feb 13, 2025, at 12:51, home user via users wrote: [snip] What is "wted", and is there a security problem? The “wted” function in the chkrootkit script runs “chwtmp -f /var/log/wtmp` (the execu

Re: security: wted?

2025-02-13 Thread home user via users
On 2/13/25 2:40 PM, Jonathan Billings wrote: On Feb 13, 2025, at 12:51, home user via users wrote: (f40; gnome; last patched minutes ago) When I ran chkrootkit, I got the following (including a few lines of context) regarding "wted": - - - - - - [snip] Checking `w55808'... not infected Che

Re: security: wted?

2025-02-13 Thread home user via users
On 2/13/25 1:15 PM, Barry wrote: On 13 Feb 2025, at 17:51, home user via users wrote: When I ran chkrootkit I cannot find evidence of this tool being maintained. But I did find people saying its reports contain false positives. Barry Thank-you, Barry. I "patch" weekly. dnf says this

Re: security: wted?

2025-02-13 Thread home user via users
On 2/13/25 1:00 PM, Dave Close wrote: home user via users wrote: (f40; gnome; last patched minutes ago) When I ran chkrootkit, I got the following (including a few lines of context) regarding "wted": - - - - - - [snip] Checking `w55808'... not infected Checking `wted'... 1 deletion(s) between T

Re: security: wted?

2025-02-13 Thread Jonathan Billings
On Feb 13, 2025, at 12:51, home user via users wrote: > > (f40; gnome; last patched minutes ago) > > When I ran chkrootkit, I got the following (including a few lines of context) > regarding "wted": > - - - - - - > [snip] > Checking `w55808'... not infected > Checking `wted'... 1 deletion(s)

Re: security: wted?

2025-02-13 Thread Barry
> On 13 Feb 2025, at 17:51, home user via users > wrote: > > When I ran chkrootkit I cannot find evidence of this tool being maintained. But I did find people saying its reports contain false positives. Barry -- ___ users mailing list -- users@l

Re: security: wted?

2025-02-13 Thread Dave Close
home user via users wrote: >(f40; gnome; last patched minutes ago) > >When I ran chkrootkit, I got the following (including a few lines of context) >regarding "wted": >- - - - - - >[snip] >Checking `w55808'... not infected >Checking `wted'... 1 deletion(s) between Tue Jan 28 07:33:49 2025 and Tue

Re: security issue?

2024-11-29 Thread Stephen Morris
On 29/11/24 10:59, Barry wrote: On 28 Nov 2024, at 22:45, Stephen Morris wrote: being /usr/bin/egrep and /usr/bin/fgrep because it has said they have been replaced by a script, is that standard Fedora? Did you check what was in the files and where they were installed from? The scripts print

Re: [closed] Re: security issue?

2024-11-29 Thread Patrick O'Callaghan
On Fri, 2024-11-29 at 20:37 +, Will McDonald wrote: > Indeed. I've jumped between RH-based and Debian-based distros a little in > the last few years. I started tracking some of the deltas here: > https://github.com/wmcdonald404/distrosetta-stone You might want to change the yum references to d

Re: [closed] Re: security issue?

2024-11-29 Thread Will McDonald
On Fri, 29 Nov 2024 at 20:01, George N. White III wrote: > On Fri, Nov 29, 2024 at 3:09 PM Will McDonald wrote: > >> On Fri, 29 Nov 2024 at 18:20, home user via users < >> users@lists.fedoraproject.org> wrote: >> There's a lot of commonality across most distros, so while something (the >> link I

Re: [closed] Re: security issue?

2024-11-29 Thread George N. White III
On Fri, Nov 29, 2024 at 3:09 PM Will McDonald wrote: > On Fri, 29 Nov 2024 at 18:20, home user via users < > users@lists.fedoraproject.org> wrote: > There's a lot of commonality across most distros, so while something (the > link I referenced, for example) was from an Ask Ubuntu branch of > Stack

Re: [closed] Re: security issue?

2024-11-29 Thread Will McDonald
On Fri, 29 Nov 2024 at 18:20, home user via users < users@lists.fedoraproject.org> wrote: > On 11/28/24 10:24 AM, home user via users wrote: > > (f-40, stand-alone workstation, gnome) > > > > A few times in the past couple of months, I've received the following > warning from "chkrootkit": > > - -

[closed] Re: security issue?

2024-11-29 Thread home user via users
On 11/28/24 10:24 AM, home user via users wrote: (f-40, stand-alone workstation, gnome) A few times in the past couple of months, I've received the following warning from "chkrootkit": - - - - - - bash.1[~]: chkrootkit ROOTDIR is `/' Checking `amd'... not found [snip] Checking `bindshell'... no

Re: security issue?

2024-11-28 Thread Will McDonald
On Thu, 28 Nov 2024 at 17:38, Jeffrey Walton wrote: > On Thu, Nov 28, 2024 at 12:25 PM home user via users > wrote: > > Checking `lkm'... You have 1 process hidden for ps command > > > > What's going on with that lkm warning? > > Do you really need us to google it for you? > And what Jeffer

Re: security issue?

2024-11-28 Thread Barry
> On 28 Nov 2024, at 22:45, Stephen Morris wrote: > > being /usr/bin/egrep and /usr/bin/fgrep because it has said they have been > replaced by a script, is that standard Fedora? Did you check what was in the files and where they were installed from? The scripts print a warning message then r

Re: security issue?

2024-11-28 Thread Patrick O'Callaghan
On Fri, 2024-11-29 at 09:45 +1100, Stephen Morris wrote: > I've run chkrootkit and it said there were no issues, but rkhunter has > reported two suspect files, being /usr/bin/egrep and /usr/bin/fgrep > because it has said they have been replaced by a script, is that > standard Fedora? fgrep and

Re: security issue?

2024-11-28 Thread Stephen Morris
On 29/11/24 04:37, Jeffrey Walton wrote: On Thu, Nov 28, 2024 at 12:25 PM home user via users wrote: (f-40, stand-alone workstation, gnome) A few times in the past couple of months, I've received the following warning from "chkrootkit": - - - - - - bash.1[~]: chkrootkit ROOTDIR is `/' Checking

Re: security issue?

2024-11-28 Thread Jeffrey Walton
On Thu, Nov 28, 2024 at 12:25 PM home user via users wrote: > > (f-40, stand-alone workstation, gnome) > > A few times in the past couple of months, I've received the following > warning from "chkrootkit": > - - - - - - > bash.1[~]: chkrootkit > ROOTDIR is `/' > Checking `amd'... not found > [snip

Re: Security context for Apache

2023-04-07 Thread Patrick O'Callaghan
On Fri, 2023-04-07 at 10:17 -0400, Todd Zullinger wrote: >     semanage fcontext -a -t httpd_sys_content_t "/web(/.*)?" >     restorecon -R -v /web > That seems to do the trick, thanks. > Yes, if you knew what command to use, finding the manpage >  [...] The old UNIX joke was that any man page

Re: Security context for Apache

2023-04-07 Thread Todd Zullinger
Patrick O'Callaghan wrote: > I've set up a simple web server for private use (though I will enable > https access from outside the network), but I want some of the content > to be outside the default /var/www/html tree. When I do this, I get > file access errors when SElinux is enabled, but not whe

Re: Security hole in MATE?

2021-11-27 Thread Ed Greshko
On 27/11/2021 18:08, Joachim Backes wrote: On 11/27/21 09:42, Ed Greshko wrote: On 27/11/2021 16:08, Joachim Backes wrote: I'm running my F35 desktop with MATE. If I wake up after having suspended the  box using some key, no password is requested, whereas the Cinnamon (I used it in F34) deskt

Re: Security hole in MATE?

2021-11-27 Thread Samuel Sieb
On 11/27/21 00:08, Joachim Backes wrote: I'm running my F35 desktop with MATE. If I wake up after having suspended the box using some key, no password is requested, whereas the Cinnamon (I used it in F34) desktop requests it. This Missing password request in MATE seems to be a security hole.

Re: Security hole in MATE?

2021-11-27 Thread Ed Greshko
On 27/11/2021 16:08, Joachim Backes wrote: I'm running my F35 desktop with MATE. If I wake up after having suspended the  box using some key, no password is requested, whereas the Cinnamon (I used it in F34) desktop requests  it. This Missing password request in MATE seems to be a security hole.

Re: Security hole in MATE?

2021-11-27 Thread Ed Greshko
On 27/11/2021 16:08, Joachim Backes wrote: I'm running my F35 desktop with MATE. If I wake up after having suspended the  box using some key, no password is requested, whereas the Cinnamon (I used it in F34) desktop requests  it. This Missing password request in MATE seems to be a security hole.

Re: Security Flaw - Thunderbird FYI

2021-09-21 Thread Ed Greshko
On 21/09/2021 11:02, Fernando Cassia wrote: On Mon., 20 Sep. 2021, 23:44 Ed Greshko, wrote: *ok, I'm exaggerating* Yes, any number of thing could happen.  And, yes, people sometimes let their guard down. And extra layer of "protection" at the program level is hardly ever bad.  Badly, imp

Re: Security Flaw - Thunderbird FYI

2021-09-20 Thread Fernando Cassia
On Mon., 20 Sep. 2021, 23:44 Ed Greshko, wrote: > > > This means if you get an encrypted message, walk away from you system, and > forget to secure it > anyone can click on an encrypted message it will be displayed. > . If you walk away from your system and forget to secure it and you don't trus

Re: Security Software Hack vs. Fedora

2020-12-17 Thread Todd Zullinger
Roberto Ragusa wrote: > and then the best: > - installs with: "curl http://random_site/install_script | sudo bash" Owww, my eyes! Please, make it stop. Any software I see which recommends that idiom in their instructions is immediately on the "never install this crapware under any circumstances.

Re: Security Software Hack vs. Fedora

2020-12-17 Thread Roberto Ragusa
On 12/17/20 6:58 PM, Jorge Fábregas wrote: Yes... and how the malicious bits were delivered thru the update mechanism...a nice reminder for us on how careful we need to be when adding 3rd-party repos be it yum repos, flatpak repos, container repos and so on. True. Even a single gpgcheck=0 is a

Re: Security Software Hack vs. Fedora

2020-12-17 Thread Garry T. Williams
On Thursday, December 17, 2020 10:08:54 AM EST Jonathan Ryshpan wrote: > I read that there has been a major security hack of at least two > companies, FireEye and SolarWinds, which supply security software > to the US Government and to major corporations. (see: > https://www.nytimes.com/2020/12/1

Re: Security Software Hack vs. Fedora

2020-12-17 Thread Jorge Fábregas
On 12/17/20 1:41 PM, stan via users wrote: > The deeper issue is that this illustrates how easy it is for skilled > programmers to insert malicious code into software so that it does > nefarious things while not being detected. That certainly affects > Fedora because it affects any system using co

Re: Security Software Hack vs. Fedora

2020-12-17 Thread stan via users
On Thu, 17 Dec 2020 07:08:54 -0800 Jonathan Ryshpan wrote: > I read that there has been a major security hack of at least two > companies, FireEye and SolarWinds,  which supply security software to > the US Government and to major corporations. >  (see: > https://www.nytimes.com/2020/12/16/opinio

Re: Security Software Hack vs. Fedora

2020-12-17 Thread Matthew Miller
On Thu, Dec 17, 2020 at 07:08:54AM -0800, Jonathan Ryshpan wrote: > I read that there has been a major security hack of at least two > companies, FireEye and SolarWinds,  which supply security software to > the US Government and to major corporations. >  (see:  > https://www.nytimes.com/2020/12/16/

Re: Security issue

2018-11-06 Thread Doug
On 11/06/2018 08:49 PM, finn via users wrote: Why wouldn't you regular review your task manager, system settings etc. to confirm your machine has been not comprised ? (Here, few things which you can do to confirm there isn't a breach in your system). 1. Failed logins: /var/log/messages 2. last

Re: [SECURITY] Fedora 25 Update: knot-resolver-1.3.1-1.fc25

2017-07-21 Thread Samuel Sieb
On 07/21/2017 07:49 PM, Tim wrote: Today I received this email, here's the salient portion: On 21/7/2017 6:24 am, upda...@fedoraproject.org wrote: BEWARE: Because of https://bugzilla.redhat.com/show_bug.cgi?id=1366968 you need to switch your system to SELinux permissive mode. That message is

Re: [SECURITY] Fedora 25 Update: knot-resolver-1.3.1-1.fc25

2017-07-21 Thread Tim
Today I received this email, here's the salient portion: On 21/7/2017 6:24 am, upda...@fedoraproject.org wrote: BEWARE: Because of https://bugzilla.redhat.com/show_bug.cgi?id=1366968 you need to switch your system to SELinux permissive mode. How was that ever accepted as a solution? That kind

Re: Security vulnerability in TCP of linux, patches available, how soon in Fedora?

2016-08-10 Thread stan
On Wed, 10 Aug 2016 13:06:33 -0600 Kevin Fenzi wrote: > This was fixed in july in Fedora kernels: > > * Tue Jul 12 2016 Josh Boyer - 4.6.4-201 > - CVE-2016-5389 CVE-2016-5969 tcp challenge ack info leak (rhbz > 1354708 1355615) Thanks Kevin, that's what I wanted to know. Phew! Sigh of relie

Re: Security vulnerability in TCP of linux, patches available, how soon in Fedora?

2016-08-10 Thread Robert Moskowitz
On 08/10/2016 03:06 PM, Kevin Fenzi wrote: On Wed, 10 Aug 2016 11:50:37 -0700 Gordon Messmer wrote: On 08/09/2016 10:44 PM, Rick Walker wrote: I'm very skeptical. Take a look at the pdf linked in the first message. The challenge ack limit was intended to improve security, but created a si

Re: Security vulnerability in TCP of linux, patches available, how soon in Fedora?

2016-08-10 Thread Kevin Fenzi
On Wed, 10 Aug 2016 11:50:37 -0700 Gordon Messmer wrote: > On 08/09/2016 10:44 PM, Rick Walker wrote: > > I'm very skeptical. > > Take a look at the pdf linked in the first message. The challenge > ack limit was intended to improve security, but created a > side-channel attack that could allo

Re: Security vulnerability in TCP of linux, patches available, how soon in Fedora?

2016-08-10 Thread Gordon Messmer
On 08/09/2016 10:44 PM, Rick Walker wrote: I'm very skeptical. Take a look at the pdf linked in the first message. The challenge ack limit was intended to improve security, but created a side-channel attack that could allow someone who doesn't control the communication path to reset conne

Re: Security vulnerability in TCP of linux, patches available, how soon in Fedora?

2016-08-10 Thread Ian Malone
On 10 August 2016 at 06:44, Rick Walker wrote: > >> 1. Open /etc/sysctl.conf, append a command >> "/net.ipv4/tcp_challenge_ack_limit = 9". > > I'm very skeptical. The default on my stock machine is 100. You can check > your own with: > > sysctl -A | grep tcp | grep limit > > In the

Re: Security vulnerability in TCP of linux, patches available, how soon in Fedora?

2016-08-09 Thread Eddie G. O'Connor Jr.
Yetjust another reason why I love Linux?!the patching system. Its on POINT! when it comes to catching and preventing these kinds of things?.this community handles its BUSINESS!...LOL!On Aug 10, 2016 12:17 AM, stan wrote: > > Hi, > > There is a severe security hole in TCP on

Re: Security of netinstall?

2016-03-24 Thread Matthew Miller
On Wed, Mar 23, 2016 at 08:43:36PM +, Troels Arvin wrote: > When I install Fedora from a netinstall image: > Given that I initially > - check the SHA256 checksum of the Fedora-Server-netinst-x86_64-23.iso >file > - check the GPG signature of the file which contained the checksum >(the

Re: Security of netinstall?

2016-03-23 Thread Rick Stevens
On 03/23/2016 01:43 PM, Troels Arvin wrote: When I install Fedora from a netinstall image: Given that I initially - check the SHA256 checksum of the Fedora-Server-netinst-x86_64-23.iso file - check the GPG signature of the file which contained the checksum (the Fedora-Server-23-x86

Re: Security Lab

2015-06-06 Thread Rahul Sundaram
Hi On Sat, Jun 6, 2015 at 2:54 PM, Martin Cigorraga wrote: > Hello, > I would like to know if it is enough to install the 'Security Lab' group > in order to get all the goodies from that spin. > Yes Rahul -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscriptio

Re: [ Security Lab spin 21 x86_64 ] Installer stuck in "Creating users" step

2015-01-03 Thread Martin Cigorraga
A brief update, You nailed it: I went with a basic install (I don't know to which group httrack belongs to) and this time were able to finish the process as expected. Cheers. On Mon, Dec 29, 2014 at 1:33 AM, Martin Cigorraga wrote: > Thanks Jim, will do! > > On Sun, Dec 28, 2014 at 1:37 AM, Jim

Re: [ Security Lab spin 21 x86_64 ] Installer stuck in "Creating users" step

2014-12-28 Thread Martin Cigorraga
Thanks Jim, will do! On Sun, Dec 28, 2014 at 1:37 AM, Jim Lewis wrote: > > > Hi all, > > I'm trying to install the spin on VirtualBox (4.3.20) on an F21 x86_64 > > host > > and got stuck there, anyone else? > > Regards, > > -Martin > > -- > > Hi Martin, > > Check this: https://bugzilla.redhat.

Re: [ Security Lab spin 21 x86_64 ] Installer stuck in "Creating users" step

2014-12-27 Thread Jim Lewis
> Hi all, > I'm trying to install the spin on VirtualBox (4.3.20) on an F21 x86_64 > host > and got stuck there, anyone else? > Regards, > -Martin > -- Hi Martin, Check this: https://bugzilla.redhat.com/show_bug.cgi?id=1130550 I ran into it when attempting to install the Fedora_Server inst ima

Re: security

2014-03-11 Thread Rick Stevens
On 03/11/2014 11:38 AM, Dustin Kempter issued this missive: We've looked in /var/log/messages, and in the /var/log/security file The /var/log/security file rotates, so make sure you're looking at the appropriate one. It may have rotated since this occurred. No smoking gun, only thing we have

Re: security

2014-03-11 Thread Michael Cronenworth
Dustin Kempter wrote: we looked at the .bash_history file for postgres and see no entries for pg_ctl however we do see the service stop command in the root .bash_history file, but we have no timestamps in the bash_history file Add this to a file in /etc/profile.d/mycustom.sh: export HISTTIMEFO

Re: security

2014-03-11 Thread Dustin Kempter
We've looked in /var/log/messages, and in the /var/log/security file No smoking gun, only thing we have so far is this: In the postgres log we see this: 2014-03-07 15:58:09 MST [27223]: [18-1] db=,user=,host= LOG: received smart shutdown request Indicating the db received a shutdown request, t

Re: security

2014-03-11 Thread Joe Zeff
On 03/11/2014 10:45 AM, Mark Haney wrote: It limits you to who has either sudo access (you/do/ have root ssh access disabled, right?) or physical access to the machine. I'd look in the logs specifically for sudo calls. Not quite. Even if you have root access by ssh disabled, there's nothing

Re: security

2014-03-11 Thread Mark Haney
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 03/11/14 13:30, Dustin Kempter wrote: > Hi, > > we have a server (CentOS 6.4) running PostgreSQL, recently someone > shut the db down and we want to find out who did this... > > I see the db shutdown request in the postgresql log, and I suspect

Re: Security Chip

2014-02-21 Thread Mark Haney
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 02/21/2014 02:07 PM, Robert P. J. Day wrote: > > i was trying to be delicate, but what i was told is that being > manufactured in china was enough to make them ineligible for entry > into secure US military installations. you can make of that

Re: Security Chip

2014-02-21 Thread Robert P. J. Day
On Fri, 21 Feb 2014, CS DBA wrote: > On 2/21/14, 11:54 AM, Robert P. J. Day wrote: > > On Fri, 21 Feb 2014, CS DBA wrote: > > > > > Hi All; > > > > > > I just ordered a Lenovo Thinkpad W540, > > > > > > the specs list this: > > > Security Chip 2 Security Chip Enabled > > > > > > I pla

Re: Security Chip

2014-02-21 Thread Justin Brown
There's no need to be concerned. You're conflating a few different issues. The security chip is a TPM, and they have been fairly common for several years. It just allows secure key storage for software that might need it. A TPM won't get in your way. The other issue is UEFI Secure Boot. There's l

Re: Security Chip

2014-02-21 Thread Chris Murphy
On Feb 21, 2014, at 11:50 AM, CS DBA wrote: > Hi All; > > I just ordered a Lenovo Thinkpad W540, > > > the specs list this: > Security Chip 2 Security Chip Enabled > > > I plan to run Fedora 20 on it. Is this something I should be concerned about? > Can it be disabled in the b

Re: Security Chip

2014-02-21 Thread Alessandro Brezzi
2014-02-21 19:58 GMT+01:00 CS DBA : > On 2/21/14, 11:54 AM, Robert P. J. Day wrote: > >> On Fri, 21 Feb 2014, CS DBA wrote: >> >> Hi All; >>> >>> I just ordered a Lenovo Thinkpad W540, >>> >>> the specs list this: >>> Security Chip 2 Security Chip Enabled >>> >>> I plan to run Fedora

Re: Security Chip

2014-02-21 Thread Mark Haney
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 02/21/2014 01:50 PM, CS DBA wrote: > Hi All; > > I just ordered a Lenovo Thinkpad W540, > > > the specs list this: Security Chip 2 Security Chip > Enabled > > > I plan to run Fedora 20 on it. Is this something I should be > conce

Re: Security Chip

2014-02-21 Thread CS DBA
On 2/21/14, 11:54 AM, Robert P. J. Day wrote: On Fri, 21 Feb 2014, CS DBA wrote: Hi All; I just ordered a Lenovo Thinkpad W540, the specs list this: Security Chip 2 Security Chip Enabled I plan to run Fedora 20 on it. Is this something I should be concerned about? Can it be disa

Re: Security Chip

2014-02-21 Thread Mark Haney
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 02/21/2014 01:54 PM, Robert P. J. Day wrote: > > i don't know about that chip, but a few weeks ago, i was down > south chatting with some military IT contractors, and they told me > that in most sites they work in, *no* *one* is even allowed int

Re: Security Chip

2014-02-21 Thread Robert P. J. Day
On Fri, 21 Feb 2014, CS DBA wrote: > Hi All; > > I just ordered a Lenovo Thinkpad W540, > > the specs list this: > Security Chip 2 Security Chip Enabled > > I plan to run Fedora 20 on it. Is this something I should be > concerned about? Can it be disabled in the bios? i don't know

Re: Security/Hacked System - Now what?!!

2013-12-22 Thread Wolfgang S. Rupprecht
bruce writes: > However you can also mod the ssh_config (i believe) to have it auto > use the keyFile with the pub/private key to negotiate the user/passwd > process for the ssh cmd. This is useful when remotely/programatically > accessing the ssh cmdline process for running remote apps, xferring

Re: Security/Hacked System - Now what?!!

2013-12-22 Thread bruce
Wolfgang, Right in what you wrote. And what you wrote allows for ssh commands to be used where you specify the keyFile. However you can also mod the ssh_config (i believe) to have it auto use the keyFile with the pub/private key to negotiate the user/passwd process for the ssh cmd. This is useful

Re: Security/Hacked System - Now what?!!

2013-12-22 Thread Wolfgang S. Rupprecht
bruce writes: > And regarding the ssh/remote access, you specify public/private keys, > and you have the key process run from the key file. This allows a user > to be able to ssh into the box without having to use the ssh passwd, > but only from the corresponding box that has the associated public

Re: Security/Hacked System - Now what?!!

2013-12-22 Thread Michael Schwendt
On Sat, 21 Dec 2013 19:36:26 -0500, bruce wrote: > For sake of discussion, assume a fresh base desktop install of the OS > (Fed/RHEL/Centos). > > After doing the install from the iso(s), you install : > -rkhunter > -chkconfig Did you mean "chkrootkit"? If so, it's only for experienced users (who

Re: Security/Hacked System - Now what?!!

2013-12-21 Thread bruce
Hi Wolfgang, Ok, say you have a box that you want to remotely access. Never a need to access the box via the gui/login. And regarding the ssh/remote access, you specify public/private keys, and you have the key process run from the key file. This allows a user to be able to ssh into the box witho

Re: Security/Hacked System - Now what?!!

2013-12-21 Thread Wolfgang S. Rupprecht
bruce writes: > You then mod SSH as required to disable root login > OK, what else should you do? Root login isn't a bad idea in and of itself. More important is to not allow anything but public key logins (eg. ECDSA, RSA). For people logging in with root credentials, give everyone a different

Re: security spin

2012-02-10 Thread Gergely Buday
> Andre Robatino fedoraproject.org> writes: > >> Does it seem like https://bugzilla.redhat.com/show_bug.cgi?id=754857 ? If so, >> you could work around it by increasing the VM's HDD space (KVM's default is 8 >> GB). > > Ignore this. You already ruled it out, sorry. No, this was. My whole disk was

Re: security spin

2012-02-07 Thread Terry Polzin
On Tue, 2012-02-07 at 20:40 +0100, Gergely Buday wrote: > Hi, > > I tried to install the fedora 16 security spin onto my fedora 15 box > as a kvm virtual machine, twice, but both times it failed just before > the end. In the second attempt I created a larger disk image so not > that is the problem

Re: security in firefox4

2011-05-22 Thread Dotan Cohen
On Fri, May 20, 2011 at 07:19, Tim wrote: >> Is that for your entire network, or just one computer? If it's just >> for the one machine, you might find it easier to maintain a simple >> hosts file. > > You might want to read my first paragraph, again... > > Though, even for just one computer, it o

Re: security in firefox4

2011-05-19 Thread Tim
Tim: >> I do something similar with my DNS server. I have a dead zone file, >> which produces instant fails to any queries to any domain names I >> associate it with. It gives me neat, central, management of all >> computers on the LAN. Dotan Cohen: > Is that for your entire network, or just one

Re: security in firefox4

2011-05-19 Thread Dotan Cohen
On Thu, May 19, 2011 at 17:05, Tim wrote: > I do something similar with my DNS server.  I have a dead zone file, > which produces instant fails to any queries to any domain names I > associate it with.  It gives me neat, central, management of all > computers on the LAN.  My named.conf file also h

Re: security in firefox4

2011-05-19 Thread Dotan Cohen
On Thu, May 19, 2011 at 16:38, Alan Cox wrote: >> Going back to my first example, simply blocking doubleclick.com cookies >> wouldn't be enough to stop them tracking you.  The mere loading of their >> graphics has counted you, and put your IP into their database to track >> for the rest of your br

Re: security in firefox4

2011-05-19 Thread Joe Wulf
Awesome solution. Thank you for helping to improve the world! - Original Message > From: Tim > To: Community support for Fedora users > Sent: Thu, May 19, 2011 10:05:27 AM > Subject: Re: security in firefox4 > > On Thu, 2011-05-19 at 14:38 +0100, Alan Cox wrote

Re: security in firefox4

2011-05-19 Thread Tim
On Thu, 2011-05-19 at 14:38 +0100, Alan Cox wrote: > The internet works better in my experience when > www.google-analytics.com > (and ssl.google-analytics.com) get blocked at firewall level or stuck > in /etc/hosts as 127.0.0.1 I do something similar with my DNS server. I have a dead zone file,

Re: security in firefox4

2011-05-19 Thread Alan Cox
> Going back to my first example, simply blocking doubleclick.com cookies > wouldn't be enough to stop them tracking you. The mere loading of their > graphics has counted you, and put your IP into their database to track > for the rest of your browsing session. You need to stop loading their > gr

Re: security in firefox4

2011-05-19 Thread Tim
On Thu, 2011-05-19 at 17:50 +0900, Misha Shnurapet wrote: > * blocked third-party cookies while online (may prevent advertisement > networks from carrying information between sites) I don't think it quite does what people hope. Well, not any more. Third party cookies are cookies that don't belon

Re: security in firefox4

2011-05-19 Thread Tim
Misha Shnurapet: >> * used Flash Block to only watch the clips I intend to watch (may >> prevent click-jacking) Dotan Cohen: > This is the single best performance enhancement that I've ever done to > a computer, it works better than a memory upgrade. Everyone for whom > I've installed Flashblock h

Re: security in firefox4

2011-05-19 Thread Dotan Cohen
2011/5/19 Misha Shnurapet : > Here's what I did for privacy in Firefox: > * used the BetterPrivacy plugin to delete Flash cookies on exit > * set the browser to delete *regular* cookies on exit You can use the CookieCuller extension to keep the cookies that you want, such as logins. > * blocked

Re: security in firefox4

2011-05-19 Thread Misha Shnurapet
19.05.2011, 17:07, "Dotan Cohen" : > On Wed, May 18, 2011 at 23:55, Aaron Konstam ; wrote: > >>  Thanks that worked to stop tracking. But I am still confused by the >>  official directions to use an option under tools? > > On Windows the Preferences menu item in under Tools, on Linux it is > under

Re: security in firefox4

2011-05-19 Thread Dotan Cohen
On Wed, May 18, 2011 at 23:55, Aaron Konstam wrote: > Thanks that worked to stop tracking. But I am still confused by the > official directions to use an option under tools? > On Windows the Preferences menu item in under Tools, on Linux it is under Edit. I have no idea why that is, probably hist

Re: security in firefox4

2011-05-18 Thread Dave Ihnat
On Wed, May 18, 2011 at 10:02:54PM -0400, Genes MailLists wrote: > Also delete your flash cookies and turn them off ... Yes. > flash P2P as well for good measure. Couldn't hurt. > Many of the 'bad guys' have switched primarily to flash cookies now > ... so deleting the regular cookies wont re

Re: security in firefox4

2011-05-18 Thread Genes MailLists
On 05/18/2011 09:49 PM, bruce wrote: > > no guarantee that won't happen.. > > if you really don't want to be tracked. clean out your cookies > regularly, as well as change your dynamic ip address every couple of > hours... > > there you go! > Also delete your flash cookies and turn them off

  1   2   >