Bug#311772:

2013-03-18 Thread Genny Salvatore
My name is 2Lt Arthur Martins,I'M US Army in Afghanistan (Kabul). I want you to keep my Consignment of funds safe for me but the question is can you be trusted?. Please if you are interested kindly Email me at arthurmartins...@yahoo.co.nz -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lis

Bug#311772: archiving 311772

2008-08-28 Thread Steve Langasek
# Automatically generated email from bts, devscripts version 2.10.35 # closed for comments :P archive 311772 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#311772: Password leaks are security holes

2008-08-28 Thread Simon Valiquette
A. Dreyer un jour écrivit: On Thu, 28 Aug 2008, Johan Walles wrote: Anyway root already has the capability to view passwords (i.e. by installing alternate login programs, sniffing tty, ...) That's obviously true, but that doesn't cover the case when logs are copied to a second system with

Bug#311772: Password leaks are security holes

2008-08-28 Thread Giles Barford
Hi, It is not often that I post but 1) Logging invalid usernames which can be used to detect all manor of attacks including dictionary username attacks and password brute force attacks. 2) As pointed out earlier the file is root only access. The argument that can be read if you physical ac

Bug#124294: Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Michael Stone
On Thu, Aug 28, 2008 at 02:37:37PM -0700, Steve Langasek wrote: On Thu, Aug 28, 2008 at 09:36:41AM +0200, Giacomo A. Catenazzi wrote: auth.log was invented for this reason, and separated to standard log: it should be readable only by root, Then there is a bug in another package if this is what

Bug#124294: Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Mark van Walraven
On Thu, Aug 28, 2008 at 02:37:37PM -0700, Steve Langasek wrote: > On Thu, Aug 28, 2008 at 09:36:41AM +0200, Giacomo A. Catenazzi wrote: > > auth.log was invented for this reason, and separated to standard log: > > it should be readable only by root, > > Then there is a bug in another package if th

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Simon Valiquette
Nico Golde un jour écrivit: Hi Johan, * Johan Walles <[EMAIL PROTECTED]> [2008-08-28 13:14]: 2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>: [...] So auth.log should log usernames, so that users don't do wrong assumption that password are not accessible by root! I can see a point in loggi

Bug#124294: Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Steve Langasek
On Thu, Aug 28, 2008 at 09:36:41AM +0200, Giacomo A. Catenazzi wrote: > auth.log was invented for this reason, and separated to standard log: > it should be readable only by root, Then there is a bug in another package if this is what "should" be, because /var/log/auth.log is readable by group adm

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Steve Langasek
On Thu, Aug 28, 2008 at 08:37:07PM +0200, ,,, wrote: > Excuse me, but this is very simple thing, this is not big philosophical > problem. > The software has ability to log login+password for troubleshooting, which > is great (users ALWAYS claim that they are writting their password > correctly,

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread ,,,
Excuse me, but this is very simple thing, this is not big philosophical problem. The software has ability to log login+password for troubleshooting, which is great (users ALWAYS claim that they are writting their password correctly, so this is nice to have). Since it's not enabled by default, yo

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread W. Martin Borgert
On 2008-08-28 13:05, Johan Walles wrote: > It's readable by anybody with physical access to the hardware. If their have physical access to the hardware, auth.log would be my least worry. > That doesn't mean Debian should *help* root doing that in a default > install. Security by default, anybody

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Giacomo A. Catenazzi
Mark Brown wrote: On Thu, Aug 28, 2008 at 01:05:19PM +0200, Johan Walles wrote: 2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>: auth.log was invented for this reason, and separated to standard log: it should be readable only by root, because users do errors. It's readable by anybody wi

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Mark Brown
On Thu, Aug 28, 2008 at 01:05:19PM +0200, Johan Walles wrote: > 2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>: > > auth.log was invented for this reason, and separated to standard log: > > it should be readable only by root, because users do errors. > It's readable by anybody with physical a

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Nico Golde
Hi Johan, * Johan Walles <[EMAIL PROTECTED]> [2008-08-28 13:14]: > 2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>: [...] > > So auth.log should log usernames, so that users don't do > > wrong assumption that password are not accessible by root! > > I can see a point in logging *valid* usernam

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Johan Walles
2008/8/28 Giacomo A. Catenazzi <[EMAIL PROTECTED]>: > Johan Walles wrote: >> Security shouldn't be based on nobody ever doing more or less common >> mistakes. > > auth.log was invented for this reason, and separated to standard log: > it should be readable only by root, because users do errors. It

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Nico Golde
Hi Johan, * Johan Walles <[EMAIL PROTECTED]> [2008-08-28 11:46]: > Let's keep debian-security in the discussion to see what others have > to say about this. > > Technically I agree with you when you say that people shouldn't enter > anything but their usernames at the login prompt, but the fact is

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Giacomo A. Catenazzi
Johan Walles wrote: Hi Nico! Let's keep debian-security in the discussion to see what others have to say about this. Technically I agree with you when you say that people shouldn't enter anything but their usernames at the login prompt, but the fact is that people (like me and the bug submitter

Bug#311772: Fwd: Password leaks are security holes

2008-08-28 Thread Johan Walles
Hi Nico! Let's keep debian-security in the discussion to see what others have to say about this. Technically I agree with you when you say that people shouldn't enter anything but their usernames at the login prompt, but the fact is that people (like me and the bug submitter for example) *do* ent

Bug#311772: Password leaks are security holes

2008-08-27 Thread Nico Golde
Hi Johan, * Johan Walles <[EMAIL PROTECTED]> [2008-08-27 22:26]: > severity 311772 critical > tag 311772 + security > thanks > > When users' clear text passwords are logged, that's a security hole. > > Setting severity to critical since this bug "introduces a security > hole on systems where you

Bug#311772: severity of 311772 is normal, tagging 311772

2008-08-27 Thread Steve Langasek
# Automatically generated email from bts, devscripts version 2.10.35 severity 311772 normal # put down the crack pipe tags 311772 - security -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Bug#311772: Password leaks are security holes

2008-08-27 Thread Johan Walles
severity 311772 critical tag 311772 + security thanks When users' clear text passwords are logged, that's a security hole. Setting severity to critical since this bug "introduces a security hole on systems where you install the package". Quote is from the definition of the critical severity at h

Bug#311772: pam_unix.so: logs unknown usernames, thus possibly logging passwords typed too early

2005-06-03 Thread Sam Hartman
That's certainly not how it should work Are you sure you are not using the audit option to pam_unix? Without that option I see: Jun 3 13:59:06 cz login[4777]: (pam_unix) check pass; user unknown Jun 3 13:59:06 cz login[4777]: (pam_unix) authentication failure; logname=hartmans uid=0 euid=0 tt