Displaying 20 results from an estimated 4000 matches similar to: "Another Fedora decision"
2015 Feb 04
4
Another Fedora decision
On 02/04/2015 02:08 PM, Lamar Owen wrote:
>
> 3.) Attacker uses a large graphics card's GPU power, harnessed with
> CUDA or similar, to run millions of bruteforce attempts per second on
> the exfiltrated /etc/shadow, on their computer (not yours).
> 4.) After a few hours, attacker has your password (or at least a
> password that hashes to the same value as your password),
2015 Feb 05
3
Another Fedora decision
On Wed, February 4, 2015 16:55, Warren Young wrote:
>> On Feb 4, 2015, at 12:16 PM, Lamar Owen <lowen at pari.edu> wrote:
>>
>> Again, the real bruteforce danger is when your /etc/shadow is
>> exfiltrated by a security vulnerability
>
> Unless you have misconfigured your system, anyone who can copy
> /etc/shadow already has root privileges. They do not need
2015 Feb 04
0
Another Fedora decision
> On Feb 4, 2015, at 12:16 PM, Lamar Owen <lowen at pari.edu> wrote:
>
> Again, the real bruteforce danger is when your /etc/shadow is exfiltrated by a security vulnerability
Unless you have misconfigured your system, anyone who can copy /etc/shadow already has root privileges. They don?t need to crack your passwords now. You?re already boned.
2015 Feb 05
0
Another Fedora decision
On Thu, February 5, 2015 9:06 am, James B. Byrne wrote:
>
> On Wed, February 4, 2015 16:55, Warren Young wrote:
>>> On Feb 4, 2015, at 12:16 PM, Lamar Owen <lowen at pari.edu> wrote:
>>>
>>> Again, the real bruteforce danger is when your /etc/shadow is
>>> exfiltrated by a security vulnerability
>>
>> Unless you have misconfigured your
2015 Feb 04
6
Another Fedora decision
On Wed, 2015-02-04 at 14:55 -0700, Warren Young wrote:
> > On Feb 4, 2015, at 12:16 PM, Lamar Owen <lowen at pari.edu> wrote:
> >
> > Again, the real bruteforce danger is when your /etc/shadow is exfiltrated by a security vulnerability
>
> Unless you have misconfigured your system, anyone who can copy /etc/shadow already has root privileges. They don?t need to
2006 Aug 19
9
SSH scans vs connection ratelimiting
Gang,
For months now, we're all seeing repeated bruteforce attempts on SSH.
I've configured my pf install to ratelimit TCP connections to port 22
and to automatically add IP-addresses that connect too fast to a table
that's filtered:
table <lamers> { }
block quick from <lamers> to any
pass in quick on $ext_if inet proto tcp from any to ($ext_if) port 22
modulate
2007 Nov 19
1
testing wireless security
I have been playing around with 3 ath based FreeBSD boxes and seem to
have got everything going via WPA and a common PSK for 802.11x
auth. However, I want to have a bit more certainty about things
working properly.
What tools do people recommend for sniffing and checking a wireless network ?
In terms of IDS, is there any way to see if people are trying to
bruteforce the network ? I see
2017 Jun 12
4
Log authentication attempts
We alse have same problem, now we are running Dovecot 2.2.30.2 and also use
Dovecot SASL for SMTP authentication (postfix 2.11).
We need to save all failed login attempts to database as source IP address,
username and date and time but post-login script can do this but only after
successful login. Failed login attempts information may be useful in the
fight with bruteforce attacks.
It's
2015 Feb 21
2
"PermitRootLogin no" should not proceed with root login
Steps to reproduce:
1) PermitRootLogin no in sshd_config
2) login with "root" user from other host
Present behaviour:
1) it asks for password 3 times and only then close the connection.
2) cpu consumption during bruteforce "attacks".
Expected behaviour:
Immediate disconnect/login fail
Workaround is to change ssh port, or ban IP after some login fails, or
limit IP that can
2010 May 24
7
[WTA] Automatically blocking on failed login
Hello All,
I had problems with the security server, the server is frequently
attacked using bruteforce attacks. Is there an application that can
perform automatic blocking when there are failed login to the ports
smtp, pop3 port, and others?
I am currently using CentOS 5.5 in some servers
Thanks in advanced.......
--
--
Best regards,
David
http://blog.pnyet.web.id
-------------- next part
2020 Oct 26
4
SV: Looking for a guide to collect all e-mail from the ISP mail server
>>"Never use a browser for email."
I don't agree.
In fact, using a browser for email or atleast initial setup, is actually more secure. This because SMTP/IMAP clients normally don't support 2FA, so you would have to "hack" a solution to enable 2FA for email.
This can be made in 2 ways: Either, you have a full fledged email setup. Whats important, is, to prevent
2008 Dec 05
2
[LLVMdev] replacing a global variable by a constant
Hi,
I am trying to replace a global variable with a constant.
I did manage to do it, but somehow it appears to be fairly bruteforce by
just iterating over all functions/bblocks/instructions and filtering for
those that load the variable and replacing the instruction with
Instruction::replaceAllUsesWith().
The more intuitive way of iterating over the uses of the variable did
not work out as I
2015 Jul 30
1
Fedora change that will probably affect RHEL
On 07/28/2015 03:06 PM, Chris Adams wrote:
> Once upon a time, Warren Young <wyml at etr-usa.com> said:
>> Much of the evil on the Internet today ? DDoS armies, spam spewers, phishing botnets ? is done on pnwed hardware, much of which was compromised by previous botnets banging on weak SSH passwords.
> Since most of that crap comes from Windows hosts, the security of Linux
>
2015 Jul 22
7
Keyboard Interactive Attack?
I read an article today about keyboard interactive auth allowing bruteforcing.
I'm afraid I have minimal understanding of what keyboard-interactive really does. What does it do, and should I have my clients set it to off in sshd_config?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2003 Jun 23
1
Bug? High CPU Usage after nessus scan
Hi all,
I think I've found a Bug in current rc2 (same occours with rc1 and
0.99.9.1).
I'am running dovecot with imap, pop3 and the ssl equivalents, after a
nessus scan of my host with Bruteforce checks on IMAP, imap-login eats
up lots of cpu.
Before the scan:
dovecot 22342 0.0 0.1 2320 636 ? SN Jun18 0:00 imap-login
dovecot 5841 0.0 0.1 2320 692 ? SN Jun21
2017 Jun 12
1
Log authentication attempts
I need to save that to database because I have more then one mail server
and them must share each other failed login attempts information.
I'll try check how Dovecot Authentication Policy works.
--JAcek
2017-06-12 16:50 GMT+02:00 Leonardo Rodrigues <leolistas at solutti.com.br>:
> Em 12/06/17 09:39, j.emerlik escreveu:
>
>> Failed login attempts information may be useful
2013 Jul 23
1
optimize integer function parameters
Hi
I have "observations" obs <- (11455, 11536, 11582, 11825, 11900, ...)
and a simulation function f(A,B,C,D,E,F), so sim <- f(A,B,C,D,E,F)
e.g. sim = c(11464, 11554, 11603, 11831, 11907, ...)
now I would like to fit A,B,C,D,E,F such that "obs" and f(A,B,C,D,E,F)
match as well as possible. A,..,F should be integers and have bounds.
How would you solve this problem
2005 Dec 11
1
geli or gbde encryption of slices
Hello,
I was playing around with geli an gbde after last EuroBSDCon.
I liked the idea of encrypting my data which resides in /home/$user.
Since this is a "single" user laptop i intended to encrypt the
whole /home partition. Well no problems with that. But i wanted
the lockfile or keyfile on a seperate usb disc. Which would be
mounted or used during boot of the system. I also used
2008 Dec 05
0
[LLVMdev] replacing a global variable by a constant
Hi Ralf,
> I am trying to replace a global variable with a constant.
You should be able to replace the initializer for the global with your
constant, mark it as having internal linkage and then run some optimization
pass over it to do the rest (not sure which one it was again, probably some
constant propagation or global value optimization).
That pass would then probably do some similar
2018 Feb 26
1
understanding dovecot director passdb configuration
Hey All
I am very new to dovecot ecosystem. Found the software really robust and
secure. Kudos to the team!!!
We are setting up dovecot imap servers sharing a single nfs mount point. So
to avoid nfs cache issues, we are setting up dovecot director. We are using
dovecot version 2.2.10. While going through the documentation of dovecot
director I stumbled across the following lines in passdb