On Thu, Aug 31, 2000 at 12:58:48PM +0200, Joachim Trinkwitz wrote:
> "Jürgen A. Erhard" <[EMAIL PROTECTED]> writes:
>
> > The default homedir perms are ok the way they are. Everyone (on the
> > system) can read everything is good old UNIX tradition.
>
> Then maybe you have to think over good old
On Thu, 31 Aug 2000, Leszek Gerwatowski wrote:
> things like "Debian has version 1.3.9 of apache and secure version is 1.3.10
> and up so Debian isn't secure". As you can say it's also real life example.
> Maybe they should be much more sceptic when thet write articles like this but
> many people t
"Jürgen A. Erhard" <[EMAIL PROTECTED]> writes:
> The default homedir perms are ok the way they are. Everyone (on the
> system) can read everything is good old UNIX tradition.
Then maybe you have to think over good old traditions *nowadays*, with
masses of UNIX (and generally computer) unaware pe
Henrique M Holschuh <[EMAIL PROTECTED]> writes:
> On Thu, 31 Aug 2000, Olaf Meeuwissen wrote:
> > Change your BIOS settings to only boot from the internal disk and
> > password protect it. On my system I have such a setup and require a
>
> BIOSes are very easy to erase, you know. Some are even s
On Thu, Aug 31, 2000 at 12:37:46AM -0700, Joey Hess wrote:
>
> That is *not* why we backport security holes.
>
> Let's look at apache. A security hole is discovered in apache. Debian has a
> current version (1.3.9) in it already. The apache team releases 1.3.10, with
> a fix for the security hol
[EMAIL PROTECTED] wrote:
> But this guy talks about security holes just by checking package version
> numbers! He dosn't look what has been done with package (debian specific
> changes including backported fixes for security holes). I often wrote
> maintainers that Debian should implement right
So
apt-get update
apt-get upgrade
on a daily routine should keep your release as secure as possible.
Yes?
On Wed, Aug 30, 2000 at 11:48:01PM +0200, Sven Burgener wrote:
> On Wed, Aug 30, 2000 at 10:47:53PM +0200, Sven Burgener wrote:
> > Debian "back-ported" the relevant security patches that w
On Thu, 31 Aug 2000, Olaf Meeuwissen wrote:
> Henrique M Holschuh <[EMAIL PROTECTED]> writes:
> > On Thu, 31 Aug 2000, Olaf Meeuwissen wrote:
> > > Edited /etc/hosts.deny to read ALL:ALL to boot.
> >
> > You probably want to add portmap: ALL to /etc/hosts.deny as well,
> > just in case. ALL: ALL d
Henrique M Holschuh <[EMAIL PROTECTED]> writes:
> On Thu, 31 Aug 2000, Olaf Meeuwissen wrote:
> > Edited /etc/hosts.deny to read ALL:ALL to boot.
>
> You probably want to add portmap: ALL to /etc/hosts.deny as well,
> just in case. ALL: ALL does not handle the portmapper for some
> reason.
In an
On Wed, Aug 30, 2000 at 02:47:44PM +0200, Thomas Guettler wrote:
> On Wed, Aug 30, 2000 at 11:55:57AM +0200, Leszek Gerwatowski wrote:
> > On SecurityPortal there is an article about Debian 2.2 security:
> >
> > http://www.securityportal.com/closet/closet2830.html
> >
> > Just read it and tel
On Thu, 31 Aug 2000, Olaf Meeuwissen wrote:
> Edited /etc/hosts.deny to read ALL:ALL to boot. This should perhaps
You probably want to add portmap: ALL to /etc/hosts.deny as well, just in
case. ALL: ALL does not handle the portmapper for some reason.
> Change your BIOS settings to only boot from
Thomas Guettler <[EMAIL PROTECTED]> writes:
> On Wed, Aug 30, 2000 at 11:55:57AM +0200, Leszek Gerwatowski wrote:
> > On SecurityPortal there is an article about Debian 2.2 security:
> >
> > http://www.securityportal.com/closet/closet2830.html
>
> The Author (Kurt Seifried) makes the newbie
On Wed, Aug 30, 2000 at 10:47:53PM +0200, Sven Burgener wrote:
> Debian "back-ported" the relevant security patches that were available
> up until potato was released. Be sure to check out the slashdot story
> going on about this.
I need to correct myself:
Security upgrades are released after th
On Wed, Aug 30, 2000 at 02:47:44PM +0200, Thomas Guettler wrote:
> Complain about old Apache, ProFTP: If you always want the latest
> fixes, you need to get the stuff from the sources (Eg www.apache.org)
Debian "back-ported" the relevant security patches that were available
up until potato was rel
> "William" == William Jensen <[EMAIL PROTECTED]> writes:
William> On Wed, 30 Aug 2000, Leszek Gerwatowski wrote:
>> Just read it and tell me what you think about it.
William> I think it has some valid points. He brings up issues
William> that make sense and should of been ta
On Wed, 30 Aug 2000, Leszek Gerwatowski wrote:
> Just read it and tell me what you think about it.
I think it has some valid points. He brings up issues that make sense and
should of been taken care of a long time ago (eg: commenting out archaic
services in inetd.conf, default homedir perms, etc
> > Just read it and tell me what you think about it.
>
> I think it has some valid points. He brings up issues that make sense
and
> should of been taken care of a long time ago (eg: commenting out archaic
> services in inetd.conf, default homedir perms, etc). Maybe Debian
> maintainers should
> --
> From: Thomas Guettler[SMTP:[EMAIL PROTECTED]
> Reply To: Thomas Guettler
> Sent: Wednesday, August 30, 2000 8:47 AM
> To: debian-user@lists.debian.org
> Cc: [EMAIL PROTECTED]
> Subject: Re: Debian 2.2 and security - SecurityPorta
On Wed, Aug 30, 2000 at 11:55:57AM +0200, Leszek Gerwatowski wrote:
> On SecurityPortal there is an article about Debian 2.2 security:
>
> http://www.securityportal.com/closet/closet2830.html
>
> Just read it and tell me what you think about it.
The Author (Kurt Seifried) makes the newbie be
On Wed, 30 Aug 2000, Leszek Gerwatowski wrote:
> Just read it and tell me what you think about it.
I think it has some valid points. He brings up issues that make sense and
should of been taken care of a long time ago (eg: commenting out archaic
services in inetd.conf, default homedir perms, etc
On SecurityPortal there is an article about Debian 2.2 security:
http://www.securityportal.com/closet/closet2830.html
Just read it and tell me what you think about it.
--
__
Leszek Gerwatowski
[EMAIL PROTECTED]
21 matches
Mail list logo