search for: inorganic5

Displaying 13 results from an estimated 13 matches for "inorganic5".

Did you mean: inorganic
1998 May 09
4
Apparent SNMP remote-root vulnerability.
...by mail2.redhat.com with SMTP; 10 May 1998 17:28:56 -0000 Received: from localhost (jlewis@localhost) by tarkin.fdt.net (8.8.5/8.8.5) with SMTP id NAA10982 for <linux-security@redhat.com>; Sun, 10 May 1998 13:28:33 -0400 Date: Sun, 10 May 1998 13:28:32 -0400 (EDT) From: Jon Lewis <jlewis@inorganic5.fdt.net> Approved: alex@yuriev.com X-Sender: jlewis@tarkin.fdt.net To: linux-security@redhat.com Subject: Re: [linux-security] Re: Lightning fast attacks? In-Reply-To: <19980509150412.4582741B09@spike.porcupine.org> Message-ID: <Pine.LNX.3.95.980510132042.436n-100000@tarkin.fdt.net>...
1997 Feb 22
2
ssh and limits on resources
While logging in via ssh (versions 1.2.17 and 1.2.12) under Linux 2.0, I found that limits weren''t being set (as shown by the output of "limit" (tcsh) or "ulimit -a" (bash). Since /etc/profile, /etc/csh.cshrc, and /etc/limits were ignored, I made /etc/sshrc and put "ulimit" statements in it. However, I was unable to limit the number of processes this way,
1998 Jul 15
0
Re: RedHat 5.X Security Book
...d, at least not that I have seen. I think it is a wonderful intro into system security, but it should be made clear that it is not intended as a "fix-all". Just my two cents. -- Jason Welman -----Original Message----- From: David Gale <dgale@datapex.com> To: Jon Lewis <jlewis@inorganic5.fdt.net> Cc: twiztah <twiztah@ANARCHY.MAXHO.COM>; Kent Crispin <kent@songbird.com>; linux-security@redhat.com <linux-security@redhat.com> Date: Wednesday, July 15, 1998 2:15 AM Subject: [linux-security] Re: RedHat 5.X Security Book >On Sun, 12 Jul 1998, Jon Lewis wrote: &g...
1998 Jul 14
2
Re: Chrooting bind 8.1.2 under debian 2.0
On Tue, 14 Jul 1998, cfb wrote: > The main problem seems to be with the way that debian starts bind using > the script /etc/init.d/bind. I thought it would be really neat to just > change the #!/bin/sh at the top of the script to something like : > #!/usr/sbin/chroot /chroot-dns/ /bin/sh > or > #!/usr/sbin/chroot /chroot-dns/ /chroot-dns/bin/sh try changing
1998 May 23
7
Re: Re: Re: Bind Overrun Bug and Linux (fwd)
> > systems which no longer seem to have this. This file contained an archive of > > the trojan''s that were inserted into the compromised system - does anybody know > > what is in these trojans? > > Check the Linux RootKit ... (LRK).. > > Typically LRK to use config-files.. (and typically LRK-users to place > files in /dev.. find /dev -type f | grep -v
1998 Jul 01
4
Serious Linux 2.0.34 security problem (fwd)
---------- Forwarded message ---------- Date: Tue, 30 Jun 1998 15:10:47 +0800 From: David Luyer <luyer@UCS.UWA.EDU.AU> To: BUGTRAQ@NETSPACE.ORG Subject: Serious Linux 2.0.34 security problem I just saw this mentioned on linux-kernel and confirmed it; #include <fcntl.h> #include <errno.h> #include <stdio.h> #include <stdlib.h> #include <unistd.h> int main(int
1997 Mar 22
2
"Secure" tftpd source for Linux?
I''ve been poking around my system, and realized that having a tftp server would be handy. (I''m working with cisco routers, which have the capability to up and download configuration images via tftp.) However, I''m not content with the usual tftpd that comes with Linux. The whole "specify each directory you want" scheme is cock-eyed to me. I''d prefer
1998 May 08
4
Lightning fast attacks?
RH4.2 Linux Intel Last night I got three of these log messages: Two in a row, one a bit later. May 8 00:35:15 osg-gw imapd[4307]: warning: can''t get client address: Connectio n reset by peer May 8 00:35:15 osg-gw imapd[4307]: refused connect from unknown Now, I have imapd blocked to non-local users using tcpd wrappers, so tcpd is trying to find the address of the remote machine (all
1998 Jun 16
7
Ethernet card addr <-> IP
-----BEGIN PGP SIGNED MESSAGE----- Hi everyone - Someone I''m working with has a requirement to map ethernet card addresses to unique IP addresses, and then have a Linux IP masquerade server know of this mapping list and not allow any data to pass from any ethernet card that a) it doesn''t know about, or b) isn''t assigned the right IP. Ideally it would also log this
1998 Jun 19
16
WARNING: Break-in attempts
Greetings all, I''m forwarding a copy of an email I sent reporting attempted break-ins on my main server, earth.terran.org. I am forwarding this because I think it is relevant that folks watch for this kind of activity in their logs to catch people who "try doorknobs" in the middle of the night. After sending this email, I sent a talk request to the user, who was still logged
1998 Jun 30
1
Patched Qpopper2.5 release Notification. (fwd)
...from tarkin.fdt.net (@209.212.128.45) by mail2.redhat.com with SMTP; 6 Jul 1998 03:44:25 -0000 Received: from localhost (jlewis@localhost) by tarkin.fdt.net (8.8.5/8.8.5) with SMTP id XAA13121; Sun, 5 Jul 1998 23:40:15 -0400 Date: Sun, 5 Jul 1998 23:40:15 -0400 (EDT) From: Jon Lewis <jlewis@inorganic5.fdt.net> X-Sender: jlewis@tarkin.fdt.net Reply-To: Jon Lewis <jlewis@inorganic5.fdt.net> To: Linux mailing list user <linux@windows95.sucks.eu.org> cc: Annex <annex@thing.annexgrp.org>, linux-security@redhat.com Subject: [linux-security] Re: Serious Linux 2.0.34 security proble...
1998 Jun 06
21
Named update for RH 4.2 exploitable?
Someone I was speaking with this evening claimed they have installed the latest named rpms yet they are still getting exploited daily and being hacked. Do the latest rpm''s for the named 4.9.x stuff fix all the root exploits or is this person just an idiot who probably has holes elsewhere in the system?
1998 Jul 10
2
Re: RedHat 5.X Security Book
[mod: This discussion has been going on "offline" with an occasional CC to linux-security. By the time I got around to do another "moderation round" this one was the latest. Everyone is keeping good context, so I think you all will be able to follow the discussion. --REW] >>>>> <seifried@seifried.org> writes: >> The only thing I can see coming out