Il giorno mer, 28/06/2017 alle 07.56 -0700, stan ha scritto:
> Is it possible you are running into this warning from the kernel
> documentation, cxacru-cf.py?
>
> # Warning: cxacru-cf.bin with MD5 hash # bac2689969d5ed5d4850f117702110
> # contains mis-aligned values which will stop the modem from
Allegedly, on or about 29 June 2017, William Mattison sent:
> Questions: When doing my windows patches and scans today, windows
> automatically downloaded and installed a new device driver for the new
> hard drive. Do I need to do that in Fedora? Did Fedora automatically
> do that already? How
Allegedly, on or about 28 June 2017, fred roller sent:
> a ways back a Microsoft official said (paraphrasing 'cause I can't
> find the reference) that they didn't mind Office, OS and the like
> being loaded illegally. Eventually the user will have to purchase the
> software as they become more dep
On Thu, 29 Jun 2017 03:33:05 -
"William Mattison" wrote:
> Good evening,
>
> I believe Stan is correct. I built this system 4+ years ago. At
> that time, it was my understanding that to get a windows-7 and Fedora
> dual-boot system, I had to install windows-7 first. I think that at
> that
On Thu, 29 Jun 2017 11:14:54 +0200
Dario Lesca wrote:
> Il giorno mer, 28/06/2017 alle 07.56 -0700, stan ha scritto:
> > Is it possible you are running into this warning from the kernel
> > documentation, cxacru-cf.py?
> >
> > # Warning: cxacru-cf.bin with MD5 hash #
> > bac2689969d5ed5d4850f117
I did an upgrade from F24 to F25.
Everything seems to be working fine.
I use xscreensaver instead of gnome-screensaver with a Gnome desktop.
I have noticed that the timer for the screensaver is not being reset
when I type or use the mouse. I can be using the machine and the
screensaver will act
William Mattison:
>> Questions: When doing my windows patches and scans today, windows
>> automatically downloaded and installed a new device driver for the new
>> hard drive. Do I need to do that in Fedora? Did Fedora automatically
>> do that already? How do I check?
Tim:
> Most likely, that
On 06/29/2017 08:35 AM, Craig Lanning wrote:
> I did an upgrade from F24 to F25.
>
> Everything seems to be working fine.
>
> I use xscreensaver instead of gnome-screensaver with a Gnome desktop.
>
> I have noticed that the timer for the screensaver is not being reset
> when I type or use the mo
Hi All;
I'm running Fedora 25, the latest update also updated Thunderbird to
version 52.2.0
Since then I am seeing lots of weird/broken behavior, I have multiple
accounts and sometimes when I open thunderbird I see the folders in an
account and other times I see the account name ad no folde
On Thu, 29 Jun 2017 10:44:29 -0600
ProPAAS DBA wrote:
> Hi All;
>
>
> I'm running Fedora 25, the latest update also updated Thunderbird to
> version 52.2.0
>
> Since then I am seeing lots of weird/broken behavior, I have multiple
> accounts and sometimes when I open thunderbird I see the fol
Both 25.2.0 and 25.2.1 have this issue -- check the Mozilla forums.
You can do a
dnf downgrade thunderbird
On 06/29/2017 11:44 AM, ProPAAS DBA wrote:
> Hi All;
>
>
> I'm running Fedora 25, the latest update also updated Thunderbird to
> version 52.2.0
>
> Since then I am seeing lots of weird/
Good afternoon,
I found the login attempts in the journalctl output, though it isn't easy.
I'll open a new thread to address what this is really about.
Before the hard drive replacement, the grub menu showed the three most recent
Fedora patches, then something like "Advanced options for Fedora
Good afternoon,
(f25 home workstation)
While looking at journalctl output yesterday and today for other reasons
(separate thread), I saw many "authentication failure" messages, over half also
saying "user=root". I also saw many "password check failed for user (root)"
messages. I saw many unk
Wikileaks released a document about an attack against CentOS / Rhel.
https://wikileaks.org/vault7/#OutlawCountry
Here's the text, there are some docs there also.
OutlawCountry
29 June, 2017
Today, June 29th 2017, WikiLeaks publishes documents from the
OutlawCountry project of the CIA that targe
On Thu, 29 Jun 2017 21:56:05 -
"William Mattison" wrote:
> Good afternoon,
>
> I found the login attempts in the journalctl output, though it isn't
> easy. I'll open a new thread to address what this is really about.
>
> Before the hard drive replacement, the grub menu showed the three
> m
On 29Jun2017 22:28, William Mattison wrote:
While looking at journalctl output yesterday and today for other reasons
(separate thread), I saw many "authentication failure" messages, over half
also saying "user=root". I also saw many "password check failed for user
(root)" messages. I saw m
On Thu, 29 Jun 2017 15:51:43 -0700
stan wrote:
> My first take is that this doesn't represent a very serious threat. Do
> you disagree?
It depends. Is the CIA module part of the NSA authored selinux
source code, so it is already in every system? :-).
_
On 06/29/2017 03:28 PM, William Mattison wrote:
While looking at journalctl output yesterday and today for other reasons (separate thread), I saw many "authentication
failure" messages, over half also saying "user=root". I also saw many "password check failed for user
(root)" messages. I saw
On Thu, 29 Jun 2017 22:28:28 -
"William Mattison" wrote:
> Good afternoon,
>
> (f25 home workstation)
>
> While looking at journalctl output yesterday and today for other
> reasons (separate thread), I saw many "authentication failure"
> messages, over half also saying "user=root". I also
On Thu, 29 Jun 2017 19:05:00 -0400
Tom Horsley wrote:
> On Thu, 29 Jun 2017 15:51:43 -0700
> stan wrote:
>
> > My first take is that this doesn't represent a very serious
> > threat. Do you disagree?
>
> It depends. Is the CIA module part of the NSA authored selinux
> source code, so it is a
On 06/29/2017 04:25 PM, stan wrote:
This is a big topic, it will take a lot of research on your part to
understand and feel comfortable with your security, if you choose to
go there. But the above should harden you to a point where it will be
difficult to exploit you.
You can always do what I d
On Thu, 29 Jun 2017 16:25:54 -0700
stan wrote:
> I'd say someone is trying to target your system.
Don't put an unprotected system with open ports on the
internet:
https://dzone.com/articles/what-i-learned-after-using-an-ssh-honeypot-for-7-d
My only open port is sshd and the firewall is setup
to
On Jun 29, 2017 3:52 PM, "stan" wrote:
Wikileaks released a document about an attack against CentOS / Rhel.
https://wikileaks.org/vault7/#OutlawCountry
Here's the text, there are some docs there also.
My first take is that this doesn't represent a very serious threat. Do
you disagree?
>
On 06/29/2017 04:25 PM, stan wrote:
> On Thu, 29 Jun 2017 22:28:28 -
> "William Mattison" wrote:
>
>> Good afternoon,
>>
>> (f25 home workstation)
>>
>> While looking at journalctl output yesterday and today for other
>> reasons (separate thread), I saw many "authentication failure"
>> messag
On Jun 29, 2017 4:06 PM, "Tom Horsley" wrote:
It depends. Is the CIA module part of the NSA authored selinux
source code, so it is already in every system? :-).
SELinux is the last place I would sneak some nefarious code in.
There are plenty of areas of the kernel that don't get looked at by
s
On Thu, 2017-06-29 at 16:56 -0700, T.C. Hollingsworth wrote:
> > Prerequisites(S//NF)
> > The target must be running a compatible 64-bit version of
> CentOS/RHEL 6.x (kernel version 2.6.32).
> This doesn't even work on Fedora.
> Fedora kernels move too fast for them to keep up with binaries; they
On 06/29/2017 04:51 PM, stan wrote:
Wikileaks released a document about an attack against CentOS / Rhel.
https://wikileaks.org/vault7/#OutlawCountry
Here's the text, there are some docs there also.
OutlawCountry
29 June, 2017
Today, June 29th 2017, WikiLeaks publishes documents from the
Out
A rule like this makes cracking your 123456 password a whole lot harder without
changing anything else.
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m recent --name
pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG --log-prefix 'SSH2
REJECT: ' --log-level info
The magi
On 06/29/2017 08:10 PM, jdow wrote:
A rule like this makes cracking your 123456 password a whole lot
harder without changing anything else.
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG
--log-prefix 'SSH2
On 06/29/2017 07:10 PM, jdow wrote:
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG
--log-prefix 'SSH2 REJECT: ' --log-level info
My iptables replied:
iptables: No chain/target/match by that name.
How is
On 06/29/2017 08:32 PM, JD wrote:
On 06/29/2017 07:10 PM, jdow wrote:
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG
--log-prefix 'SSH2 REJECT: ' --log-level info
My iptables replied:
iptables: No chai
On 06/29/2017 07:48 PM, Doug wrote:
On 06/29/2017 08:32 PM, JD wrote:
On 06/29/2017 07:10 PM, jdow wrote:
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG
--log-prefix 'SSH2 REJECT: ' --log-level info
On 06/29/2017 09:08 PM, JD wrote:
On 06/29/2017 07:48 PM, Doug wrote:
On 06/29/2017 08:32 PM, JD wrote:
On 06/29/2017 07:10 PM, jdow wrote:
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j
LOG --log-prefi
On 06/29/2017 06:48 PM, Doug wrote:
On 06/29/2017 08:32 PM, JD wrote:
On 06/29/2017 07:10 PM, jdow wrote:
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG
--log-prefix 'SSH2 REJECT: ' --log-level info
M
The consensus seems to agree with me, that this is a minor threat
as threats go.
I thought I was paranoid about security. But after the comments in this
thread, I think maybe I'm not paranoid enough. That the IT security
professionals are paranoid enough to cover their cameras? If they're
that w
On 06/29/2017 06:48 PM, Doug wrote:
On 06/29/2017 08:32 PM, JD wrote:
On 06/29/2017 07:10 PM, jdow wrote:
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG
--log-prefix 'SSH2 REJECT: ' --log-level info
M
On Thu, 29 Jun 2017 21:20:39 -0500
Doug wrote:
> On 06/29/2017 09:08 PM, JD wrote:
> >
> >
> > On 06/29/2017 07:48 PM, Doug wrote:
> >>
> >> On 06/29/2017 08:32 PM, JD wrote:
> >>>
> >>>
> >>> On 06/29/2017 07:10 PM, jdow wrote:
> iptables -t filter -A IN_public_deny -p tcp --dport pop
On 06/29/2017 09:40 PM, Mike Wright wrote:
On 06/29/2017 06:48 PM, Doug wrote:
On 06/29/2017 08:32 PM, JD wrote:
On 06/29/2017 07:10 PM, jdow wrote:
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j
LOG --lo
On Thu, 2017-06-29 at 19:34 -0700, stan wrote:
> The consensus seems to agree with me, that this is a minor threat
> as threats go.
>
> I thought I was paranoid about security. But after the comments in
> this
> thread, I think maybe I'm not paranoid enough. That the IT security
> professionals
On Thu, 29 Jun 2017 19:26:37 -0700
Mike Wright wrote:
> Hi Doug,
>
> Before you give up look at this.
>
> That looks a firewalld chain name (guessing). If it doesn't
> recognize it you're probably not running it.
>
> If you want to use iptables (the built-in kernel firewall) and watch
> SSH c
On 06/29/2017 07:56 PM, Doug wrote:
On 06/29/2017 09:40 PM, Mike Wright wrote:
On 06/29/2017 06:48 PM, Doug wrote:
On 06/29/2017 08:32 PM, JD wrote:
On 06/29/2017 07:10 PM, jdow wrote:
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck -
Hi,
I'm trying to write a service file for a daemon and having some
problems. I believe the issue is with the ability to give the process
write and read access to parts of the filesystem which appear to
somehow be restricted.
The daemon is the Avira virus scanner, which runs under amavisd-new.
Th
On 30.06.2017 00:51, stan wrote:
Wikileaks released a document about an attack against CentOS / Rhel.
https://wikileaks.org/vault7/#OutlawCountry
Here's the text, there are some docs there also.
My first take is that this doesn't represent a very serious threat. Do
you disagree?
if we were t
On Thu, 2017-06-29 at 20:38 -0400, William Oliver wrote:
> Personally, I assume that my computers are always on the verge of being
> compromised. It's one of the things I like about fedora -- I always do
> a clean install when a new version comes out, and I occasionally to a
> clean reinstall mid
On 06/29/2017 06:10 PM, jdow wrote:
A rule like this makes cracking your 123456 password a whole lot harder
without changing anything else.
iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m
recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG
--log-prefix 'SSH2
> Add the entry
> GRUB_DISABLE_SUBMENU=y
> to the /etc/default/grub file.
That made no difference. Then I did "grub2-mkconfig". Still no difference.
> Try adding the entry
> GRUB_GFXPAYLOAD_LINUX=text
> to the /etc/default/grub file. You might have to play with this a
> little. To examine
There are a whole lot of other elements to the firewall that you'd need. For
example you need IN_public_deny to be defined. (That is the specific filter it
is working within.) I took the basic filter that SL 7.2 generated and a very
modified and very old Trinity OS firewall using IPChains when I
Addendum - turn off any other firewall to use the one I just posted.
{^_^}
On 2017-06-29 18:24, Doug wrote:
On 06/29/2017 08:10 PM, jdow wrote:
A rule like this makes cracking your 123456 password a whole lot harder
without changing anything else.
iptables -t filter -A IN_public_deny -p tcp -
On 06/29/2017 07:56 PM, Doug wrote:
I have no firewall. What I want is something like Windows has:
Bitdefender, or Malware Bytes. If I turn on any of the suggested
firewalls, something that I
use will probably be blocked--email, Google, something. Sorry I'm just
too stupid to understand this.
On 06/29/2017 06:24 PM, Doug wrote:
I tried to write this command to a root console in PCLInuxOS, but it got
rejected.
[root@linux1 doug]# iptables -t filter -A IN_public_deny -p tcp --dport
pop3s --syn -m recent --name pop3s_attack --rcheck --seconds 90
--hitcount 2 -j LOG --log-prefix 'SSH2
On 06/29/2017 10:16 PM, jdow wrote:
Addendum - turn off any other firewall to use the one I just posted.
All this complex iptables rules info is not helpful to someone new to
Linux. The firewalld service is perfect for them. For those of us with
lots of experience, sure, we make our own cus
On 06/29/2017 10:39 PM, Joe Zeff wrote:
On 06/29/2017 07:56 PM, Doug wrote:
I have no firewall. What I want is something like Windows has:
Bitdefender, or Malware Bytes. If I turn on any of the suggested
firewalls, something that I
use will probably be blocked--email, Google, something. Sorry
52 matches
Mail list logo