Displaying 11 results from an estimated 11 matches for "haselton".
2012 Jan 05
6
SELinux and access across 'similar types'
http://wiki.centos.org/HowTos/SELinux
says:
"Access is only allowed between similar types, so Apache running as
httpd_t can read /var/www/html/index.html of type httpd_sys_content_t."
however the doc doesn't define what "similar types" means. I assumed it
just meant "beginning with the same prefix". However that can't be
right because on my system with
2012 Jan 10
2
defense-in-depth possible for sshd?
If an attacker finds an exploit to take control of httpd, they're still
blocked in part by the fact that httpd runs as the unprivileged apache
user and hence can't write any root-owned files on the system, unless
the attacker also knows of a second attack that lets apache escalate its
privilege. Basically correct?
What about sshd -- assuming that the attacker can connect to sshd at
2012 Jan 01
11
an actual hacked machine, in a preserved state
(Sorry, third time -- last one, promise, just giving it a subject line!)
OK, a second machine hosted at the same hosting company has also apparently
been hacked. Since 2 of out of 3 machines hosted at that company have now
been hacked, but this hasn't happened to any of the other 37 dedicated
servers that I've got hosted at other hosting companies (also CentOS, same
version or almost),
2011 Dec 28
8
what percent of time are there unpatched exploits against default config?
Suppose I have a CentOS 5.7 machine running the default Apache with no
extra modules enabled, and with the "yum-updatesd" service running to pull
down and install updates as soon as they become available from the
repository. (Assume further the password is strong, etc.) On the other
hand, suppose that as the admin, I'm not subscribed to any security alert
mailing lists which send
2011 Dec 28
3
why not have yum-updatesd running by default?
Ever since someone told me that one of my servers might have been hacked
(not the most recent instance) because I wasn't applying updates as soon as
they became available, I've been logging in and running "yum update"
religiously once a week until I found out how to set the yum-updatesd
service to do the equivalent automatically (once per hour, I think).
Since then, I've
2012 Jan 02
2
'last' command doesn't include ssh connections made by this perl script?
My home machine has IP 50.54.225.130. I have (for the purposes of this
experiment) one remote machine at www.peacefire.org (69.72.177.140) and
another at www.junkwhale.com.
When I'm logged in to peacefire, I run this perl script to open an ssh
connection to junkwhale and run a command:
my $hostname="www.junkwhale.com";
my $server_password = "[redacted!]";
use Net::SFTP;
2012 Jan 16
2
bounties for exploits against CentOS?
With companies like Facebook and Google offering cash prizes for people
who can find security holes in their products, has there ever been any
consideration given to offering cash rewards to people finding security
exploits in CentOS or in commonly bundled services like Apache?
(Provided of course they follow "responsible disclosure" and report the
exploit to the software authors
2012 Jan 11
2
SELinux blocking cgi script from "writing to socket (httpd_t)"
Is this really supposed to get easier over time? :) Now my audit.log
file shows that SELinux is blocking my cgi script, index.cgi (which is
what's actually served when the user visits the front page of one of our
proxy sites like sugarsurfer.com) from having '"read write" to socket
(httpd_t)'. I have no idea what that means, except that I thought that
cgi scripts were
2012 Jan 04
1
edit proposal to /HowTos/SELinux - how to relabel filesystem
Following the steps under "Contribute to the Wiki" at
http://wiki.centos.org/Contribute#head-42b3d8e26400a106851a61aebe5c2cca54dd79e5
My Wiki name is BennettHaselton. I wanted to edit this paragraph:
"Note: When switching from Disabled to either Permissive or Enforcing
mode, it is highly recommended that the system be rebooted and the
filesystem relabeled."
to add:
"This can be accomplished with the commands
touch /.autorelabel
reboot
If th...
2014 Apr 01
3
trouble installing Math::BigInt module
I had to move a perl script from an old server to a new one. Both the
old and new servers are running "CentOS release 5.10 (Final)" and perl
v5.8.8. (But the problem I'm running into appears to be a package
management problem and not a Perl problem which is why I'm posting it to
a CentOS list.)
The line of code in the script that attempts to open a Net::SFTP
connection,
2012 Jan 01
0
(no subject)
(Tried sending this before but it doesn't look like it went through;
apologies if you're seeing it twice.)
OK, a second machine hosted at the same hosting company has also apparently
been hacked. Since 2 of out of 3 machines hosted at that company have now
been hacked, but this hasn't happened to any of the other 37 dedicated
servers that I've got hosted at other hosting