similar to: Re: RedHat5.1 security flaws.

Displaying 20 results from an estimated 3000 matches similar to: "Re: RedHat5.1 security flaws."

1998 Jun 01
0
Re: RedHat5.1 security flaws.
On Mon, 1 Jun 1998, Chris Evans wrote: > Sadly the number of unaddressed security issues in RedHat Linux systems > is creeping up. > > It is becoming difficult for me to keep track of them all. Since I am keen > they all get fixed ASAP, I''ve put up a text file of these issues on the > web. > > http://ferret.lmh.ox.ac.uk/~chris/rhbugs.txt > > I hope this is
1998 Aug 02
0
ipportfw - security
Hi Are there any known security holes or necessary precautions in using port forwarding with ipportfw? I'm planning on forwarding ports from an outer firewall/router (connected to the Internet) to a host in the DMZ, then on from the DMZ host to the inner firewall, and finally from the inner firewall to some host on the inside. Thanks, Jens jph@strengur.is From mail@mail.redhat.com Wed
1998 May 28
0
ALERT: Tiresome security hole in "xosview", RedHat5.1?
Hi, I am bemused. After some security auditing on RH5.0, I was curious as to what new suid binaries and daemons shipped with RH5.1. The first one I noticed was "xosview". God knows why it needs to be SUID; it probably doesn''t but the makefile just makes the binary suid by default. Linux has /proc which has enough information that ferreting around in /dev/kmem using root privs
2011 Feb 02
2
yum confusion...
Hi, I just installed a new server and my final yum update fails... I have rpmforge and rpmforge-extras, but with yum priorities... # grep enabled /etc/yum/pluginconf.d/priorities.conf enabled = 1 # cat /etc/yum.repos.d/CentOS-Base.repo | grep "priority\|^\[" [base] priority=1 [updates] priority=1 ... # yum clean all # yum list | grep "tcp_wrappers\|nfs-utils"
2004 Oct 31
2
[Bug 948] high CPU in sshd after tcp_wrappers deny
http://bugzilla.mindrot.org/show_bug.cgi?id=948 Summary: high CPU in sshd after tcp_wrappers deny Product: Portable OpenSSH Version: 3.9p1 Platform: Sparc OS/Version: Solaris Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-bugs at mindrot.org ReportedBy:
1998 Aug 05
6
Problem with TCP_wrappers
Hi, I''m running into something weird here. I''m using RH5.1 with tcp_wrappers 7.6. The syntax for hosts.allow and hosts.deny is: <service list> : <access list> [ : <shell_command> ] Everything works when I _don''t_ use the shell_command. I used the _exact_ line as in the man-pages utilising "safe_finger" (comes with tcp_wrappers), tcpdchk
2010 Dec 03
1
[PATCH] upsd tcp_wrappers parsing and logging
Parsing bug was discussed here: <http://lists.alioth.debian.org/pipermail/nut-upsuser/2010-September/006230.html> Parsing bug summary ------------------- working /etc/hosts.allow: upsd 127.0.0.1 [::1] : ALLOW broken in /etc/hosts.allow: upsd localhost : ALLOW It looks like upsd originally intended to match nut username with system username? This is not the case now. This causes
2010 Jan 18
0
2.2.1 to 2.4.1 migration (allowfrom/tcp_wrappers)
Hello, I just upgraded my nut 2.2.1 setup to 2.4.1. The "upsdrvctl shutdown" command now works using a APC Backup-UPS CS350 via USB. Great! The removed ACL/allowfrom functionality can be replaced by tcp_wrappers. Unfortunately there isn't much documentation about the migration. First you have to compile nut with "--with-wrap". I have a special "nutadmin"
2006 Jun 09
1
Can't run POP3 and IMAP simultaneously from xinetd...
Hello all, I'm hoping you can help out with an issue I'm having running dovecot-beta8 on Solaris 9 (SPARC). The reason I need to run them from xinetd is that we require the filtering ability that tcp_wrappers provide. My issue is that, when running both from xinetd, IMAP runs fine, but then, when you try to POP in to check mail on the same box, it seems that the login section is
2000 Oct 31
0
Solaris 2.6 + Expired Password Annoyance
The latest snapshot works well for me, except for one minor annoyance. When logging into an account with an expired password, OpenSSH asks for the current login password twice and then it asks for the new password. Other than that, everything works swell. [fortezzo at entralla /root]$ ssh fortezzo at firrerre Warning: Permanently added 'firrerre,xx.xx.xx.xx' (DSA) to the list of known
2020 Aug 21
0
RHEL7/CentOS7 RPM of dovecot 2.3.11.3-3 seems to have dropped tcpwrap support
>>>> At a guess it was removed from the spec for el8 (which does not support >>>> tcpwrap) and somehow got removed from el7 by accident. The ghettoforge >>>> dovecot23 packages have tcpwrap support for el7: > > So is el8 truly incompatible with tcpwrap? Or is it just too much > effort to continue suport for every feature that was ever in the system?
2003 Apr 18
0
[Fwd: Xinetd 2.3.10 Memory Leaks]
I just submitted a PR for this (haven't even gotten the confirmation email), but since not everyone tracks the GNATS CVS distribution, I figured that I'd send it here as well. -----Forwarded Message----- > From: Steve Grubb <linux_4ever@yahoo.com> > To: bugtraq@securityfocus.com > Subject: Xinetd 2.3.10 Memory Leaks > Date: 18 Apr 2003 16:18:36 +0000 > > >
2003 Mar 30
4
cant set up a no password login
hi have problems to get an samba server up that offers shares for all without a password heres my smb.conf file located under /usr/local/samba/lib/smb.conf [global] netbios name = DEATHB server string = Samba %v on (%L) workgroup = LANSTRIKE encrypt passwords = yes security = share [homes] browseable = no [mp3] comment = lmh path = /var/glftpd/site/mp3/lame.r3mix/ browseable = yes read only =
2000 Oct 07
2
[PATCH]: Add tcp_wrappers protection to port forwarding
Hi, attached is a patch by Chris Faylor <cgf at cygnus.com> relative to 2.2.0p1. Description: OpenSSH does not allow port gatewaying by default. This means that only the local host can access forwarded ports. Adding "GatewayPorts yes" to .ssh/config usually does this job. Unfortunately, OpenSSH does not recognize the same hosts.allow/ hosts.deny options as ssh.com's sshd
2008 Jun 12
2
Need a quick, safe method to empty /home/user/Maildir/{.Junk, .Trash}
I have some (Thunderbird client, dovecot-1.0.13, Maildir) users who get an appalling amount of spam-with-attachment, and it's causing backups to take an inordinate amount of time. I'll implement some quota and server-side spam management when I go to dovecot-1.1, but in the meantime: What is the safest way to empty all messages within, but not delete, the following folders from the
2011 Feb 06
1
Drive id confusion
Solaris and/or ZFS are badly confused about drive IDs. The "c5t0d0" names are very far removed from the real world, and possibly they''ve gotten screwed up somehow. Is devfsadm supposed to fix those, or does it only delete excess? Reason I believe it''s confused: zpool status shows mirror-0 on c9t3d0, c9t2d0, and c9t5d0. But format shows the one remaining Seagate
2020 Aug 08
2
Rsync 3.2.3 released
Rupert Gallagher via rsync <rsync at lists.samba.org> wrote: > On 7 Aug 2020, 23:44, Wayne Davison < wayne at opencoder.net> wrote: > > >> Also, I have 12GB of cache in ecc ram that rsync is not using. > > >It uses whatever memory it needs plus whatever filesystem caching > >your OS provides. > > Hmmm... bad day today... > > No, it is not
2014 Mar 23
1
[CentOS} Does anyone use tcp_wrappers?
Most certainly YES!!! Next to iptables tcp_wrappers is a solid seconde line of defense. The argument that is is no longer developped is rubbish. The package does what is should do, functionality isexactly what it should be and it is bug free. Also it is flexible enough to do other tricks with it like spawning something depending on the ip address the incoming connection is coming from. It is a
2009 Jun 21
1
tcp_wrappers
Hi, I've just started using Dovecot (v1.1.14), and I'm noticing a lot of dictionary attacks. I searched through the documentation and the mailing list archives hoping to find support for tcp_wrappers (hosts.deny) support. I did find some suggested patches in the list from last year, but as far as I can tell, there is no support in the released versions. Is this implemented and
2004 May 18
5
AArgh, * and the 7960
I've just had the most appalling performance from * ever. Dialling: Cisco 7960 => asterisk => IAX produces sound drop outs so extreme that the call is useless. I noted this in an earlier post. Dialling: Cisco ATA186 => asterisk => IAX is fine. Frankly, I think this is such a bad problem that it should be sorted in advance of any of the new features that seem to be