Re: Debian Investigation Report after Server Compromises

2003-12-10 Thread Colin Watson
On Wed, Dec 10, 2003 at 11:35:12AM -0500, Mike Mueller wrote: > On Monday 08 December 2003 18:20, Colin Watson wrote: > > You can go further by requiring physical presentation > > of smartcards or similar in order to use the key, which is less > > convenient but makes a passphrase more or less usel

Re: Debian Investigation Report after Server Compromises

2003-12-10 Thread Mike Mueller
On Monday 08 December 2003 18:20, Colin Watson wrote: > You can go further by requiring physical presentation > of smartcards or similar in order to use the key, which is less > convenient but makes a passphrase more or less useless on its own. Aren't smartcards similar to dongles in some respects

Re: Debian Investigation Report after Server Compromises

2003-12-09 Thread Karsten M. Self
on Tue, Dec 09, 2003 at 02:03:43PM +, Colin Watson ([EMAIL PROTECTED]) wrote: > On Mon, Dec 08, 2003 at 05:25:38PM -0800, Karsten M. Self wrote: > > on Mon, Dec 08, 2003 at 11:13:07PM +, Colin Watson ([EMAIL PROTECTED]) wrote: > > > My understanding is that the developer's account on the ma

Re: Debian Investigation Report after Server Compromises

2003-12-09 Thread Colin Watson
On Mon, Dec 08, 2003 at 05:25:38PM -0800, Karsten M. Self wrote: > on Mon, Dec 08, 2003 at 11:13:07PM +, Colin Watson ([EMAIL PROTECTED]) wrote: > > My understanding is that the developer's account on the machine in > > question had been disused for some time, and that the machine wasn't > > ve

Re: fingerprints Re: Debian Investigation Report after Server Compromises

2003-12-08 Thread Roberto Sanchez
Alvin Oga wrote: [SNIP] you can also use a [warm blooded] fingerprint scanner ... since "smartcards can be lost" .. - but if you lose your finger or you lose your fingerprint on a glass with fingerprint stealing glue, you're in deep kaka

fingerprints Re: Debian Investigation Report after Server Compromises

2003-12-08 Thread Alvin Oga
On Mon, 8 Dec 2003, Colin Watson wrote: > What you'd actually want is hardware that stores the keys and does the > signing and decryption for you, but refuses to expose the private key > material itself to the host. Then, while a cracker could sniff your > passphrase, the key itself would still

Re: Debian Investigation Report after Server Compromises

2003-12-08 Thread Karsten M. Self
on Mon, Dec 08, 2003 at 11:13:07PM +, Colin Watson ([EMAIL PROTECTED]) wrote: > On Wed, Dec 03, 2003 at 06:08:54PM -0700, Monique Y. Herman wrote: > > After reading a few more responses, I realize that of course a debian > > developer's machine could get compromised. I guess I just thought the

Re: Debian Investigation Report after Server Compromises

2003-12-08 Thread Colin Watson
On Wed, Dec 03, 2003 at 09:46:21PM -0500, Carl Fink wrote: > On Wed, Dec 03, 2003 at 05:52:30PM -0800, Vineet Kumar wrote: > > I'm considering keeping my private keys (ssh, gpg, etc) on removable > > storage, maybe one of those USB keys (then my keys could actually go on > > my keyring...). It's c

Re: Debian Investigation Report after Server Compromises

2003-12-08 Thread Colin Watson
On Wed, Dec 03, 2003 at 06:08:54PM -0700, Monique Y. Herman wrote: > After reading a few more responses, I realize that of course a debian > developer's machine could get compromised. I guess I just thought they > were infallible *grin* > > Now, the real question is, what exploit was used to get

Re: Debian Investigation Report after Server Compromises

2003-12-06 Thread Hoyt Bailey
- Original Message - From: "Hugo Vanwoerkom" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, December 05, 2003 12:47 Subject: Re: Debian Investigation Report after Server Compromises > Hoyt Bailey wrote: > > - Original Message - &g

Re: Debian Investigation Report after Server Compromises

2003-12-06 Thread Hoyt Bailey
- Original Message - From: "csj" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, December 05, 2003 07:56 Subject: Re: Debian Investigation Report after Server Compromises > On 4. December 2003 at 3:22PM -0600, > "Hoyt Bailey" <[

Re: Debian Investigation Report after Server Compromises

2003-12-05 Thread Paul Morgan
On Fri, 05 Dec 2003 16:28:06 -0800, Vineet Kumar wrote: > * Paul Morgan ([EMAIL PROTECTED]) [031205 14:24]: >> On Thu, 04 Dec 2003 18:05:15 -0800, Vineet Kumar wrote: >> >> > * Paul Morgan ([EMAIL PROTECTED]) [031204 12:32]: >> >> I have all services locked down to localhost; my only connections

Re: Debian Investigation Report after Server Compromises

2003-12-05 Thread Vineet Kumar
* Paul Morgan ([EMAIL PROTECTED]) [031205 14:24]: > On Thu, 04 Dec 2003 18:05:15 -0800, Vineet Kumar wrote: > > > * Paul Morgan ([EMAIL PROTECTED]) [031204 12:32]: > >> I have all services locked down to localhost; my only connections to > >> the outside world are mail, news via nntpcached, web vi

Re: Debian Investigation Report after Server Compromises

2003-12-05 Thread Paul Morgan
On Thu, 04 Dec 2003 18:05:15 -0800, Vineet Kumar wrote: > * Paul Morgan ([EMAIL PROTECTED]) [031204 12:32]: >> I have all services locked down to localhost; my only connections to >> the outside world are mail, news via nntpcached, web via squid... I run >> Apache but it too is locked down to loca

Re: Debian Investigation Report after Server Compromises

2003-12-05 Thread Hugo Vanwoerkom
Hoyt Bailey wrote: - Original Message - From: "csj" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, December 03, 2003 22:40 Subject: Re: Debian Investigation Report after Server Compromises On 3. December 2003 at 5:52PM -0800, Vineet Kumar <

Re: Debian Investigation Report after Server Compromises

2003-12-05 Thread csj
On 4. December 2003 at 3:22PM -0600, "Hoyt Bailey" <[EMAIL PROTECTED]> wrote: > From: "csj" <[EMAIL PROTECTED]> [...] > > Now I'm curious: is it possible to get rooted while on > > dialup? I'm thinking of a user with access to a slow but > > dirt cheap dialup connection and so is online for sig

fast - Re: Debian Investigation Report after Server Compromises

2003-12-05 Thread Alvin Oga
On Thu, 4 Dec 2003, csj wrote: > Now I'm curious: is it possible to get rooted while on dialup? fastest breakin i know about took about 15 seconds for them (the crackers) to get in and play with that new box ... once that machine went online ... they were already cracked and had to reinstalll

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Vineet Kumar
* Paul Morgan ([EMAIL PROTECTED]) [031204 12:32]: > I have all services locked down to localhost; my only connections to > the outside world are mail, news via nntpcached, web via squid... I run > Apache but it too is locked down to localhost. My mail is run through my this ... > ISP's (earthli

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Hoyt Bailey
- Original Message - From: "csj" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, December 03, 2003 22:40 Subject: Re: Debian Investigation Report after Server Compromises > On 3. December 2003 at 5:52PM -0800, > Vineet Kumar <[EMAIL PROTE

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Paul Morgan
On Wed, 03 Dec 2003 21:46:21 -0500, Carl Fink wrote: > If the system is rooted, it would be trivial to write a replacement > for ssh (GPG, etc.) that copies your private keys onto the hard drive > for later retrieval. Definition of "trivial" is: I, a bad > programmer, could do it. Well bad in th

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Paul Morgan
On Thu, 04 Dec 2003 12:40:42 +0800, csj wrote: > On 3. December 2003 at 5:52PM -0800, > Vineet Kumar <[EMAIL PROTECTED]> wrote: > >> * Monique Y. Herman ([EMAIL PROTECTED]) [031203 16:59]: >> > I have been wondering about the password-sniffing thing, too. >> > If you send a password using ssh, is

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Paul Johnson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Thu, Dec 04, 2003 at 12:40:42PM +0800, csj wrote: > Now I'm curious: is it possible to get rooted while on dialup? Yes. However, being on dialup adds some additional difficulties for an attacker: 1) Most dialup systems have big, dynamic pools wit

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Vineet Kumar
* csj ([EMAIL PROTECTED]) [031204 08:37]: > On 3. December 2003 at 5:52PM -0800, > Vineet Kumar <[EMAIL PROTECTED]> wrote: > > > * Monique Y. Herman ([EMAIL PROTECTED]) [031203 16:59]: > > > I have been wondering about the password-sniffing thing, too. > > > If you send a password using ssh, isn't

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread John Hasler
csj writes: > Now I'm curious: is it possible to get rooted while on dialup? Of course. It's a little harder because the dialup gets a different IP number on each connection, but not impossible. Dialups are rarely attacked because they are uninteresting to most crackers due to their slow speed a

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Tom
On Thu, Dec 04, 2003 at 12:40:42PM +0800, csj wrote: > Now I'm curious: is it possible to get rooted while on dialup? Sure. An ip address is an ip address. It's just slower. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread csj
On 3. December 2003 at 5:52PM -0800, Vineet Kumar <[EMAIL PROTECTED]> wrote: > * Monique Y. Herman ([EMAIL PROTECTED]) [031203 16:59]: > > I have been wondering about the password-sniffing thing, too. > > If you send a password using ssh, isn't it encrypted? > > > > I suppose some debian develope

Re: keys - Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread John Hasler
> i never did undestand why, people wanna run rootkits once they > got in Usually they want to use the rooted machine to send spam, run DoS bots, or to cover their trail while cracking other, more interesting machines. I agree that when cracking a DD's machine in order to get his Debian password

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Isaac To
> "Isaac" == Isaac To <[EMAIL PROTECTED]> writes: > "Paul" == Paul Morgan <[EMAIL PROTECTED]> writes: Paul> With regard to your question 3, a buffer overflow exploit is Paul> always a stack exploit and is designed to execute arbitrary code Paul> with the called program's privil

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Isaac To
> "Paul" == Paul Morgan <[EMAIL PROTECTED]> writes: Paul> With regard to your question 3, a buffer overflow exploit is Paul> always a stack exploit and is designed to execute arbitrary code Paul> with the called program's privilege. But this time it is an "integer overflow", not a

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Dave
Sorry for the duplicate post. The first one did not appear for a long time, and I assumed it was because I used the wrong email address. -- Dave -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: Debian Investigation Report after Server Compromises

2003-12-04 Thread Karsten M. Self
on Wed, Dec 03, 2003 at 10:33:34AM -0700, Dr. MacQuigg ([EMAIL PROTECTED]) wrote: > After reading the report at > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html > and following this newsgroup discussion, I have some very basic questions: > > 1) What is a "sniffed pas

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Monique Y. Herman
On Thu, 04 Dec 2003 at 01:52 GMT, Vineet Kumar penned: > > BTW, Monique, your UA seems to have really screwed up on the message > you replied to. Is it not MIME-aware? The reply had a quoted MIME > header in it, along with a lot of non-decoded QP equals signs littered > about it. > http://sour

keys - Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Alvin Oga
On Wed, 3 Dec 2003, Carl Fink wrote: > > If the system is rooted, it would be trivial to write a replacement > for ssh (GPG, etc.) that copies your private keys onto the hard drive > for later retrieval. Definition of "trivial" is: I, a bad > programmer, could do it. why copy and get it later

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Carl Fink
On Wed, Dec 03, 2003 at 05:52:30PM -0800, Vineet Kumar wrote: > I'm considering keeping my private keys (ssh, gpg, etc) on removable > storage, maybe one of those USB keys (then my keys could actually go on > my keyring...). It's certainly not foolproof, but at least a sniffed > passphrase could

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Bijan Soleymani
Vineet Kumar <[EMAIL PROTECTED]> writes: > BTW, Monique, your UA seems to have really screwed up on the message you > replied to. Is it not MIME-aware? The reply had a quoted MIME header > in it, along with a lot of non-decoded QP equals signs littered about it. I think she posts through the gm

kernel config -- Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Alvin Oga
hi ya benedict On Wed, 3 Dec 2003, Benedict Verheyen wrote: > > I'm one of those who's got all his systems on safe kernels, even if this > > means I don't have full use. NICs on one box aren't supported by > > 2.4.18, and building 2.4.23 is turning into a bitch. > > Is there a page anywhere (i

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Monique Y. Herman
On Wed, 03 Dec 2003 at 23:05 GMT, Monique Y. Herman penned: > > I have been wondering about the password-sniffing thing, too. If you > send a password using ssh, isn't it encrypted? > > I suppose some debian developer's kid sister could have installed a > keystroke logger on the dev machine ...

buffer-overflow pic - Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Alvin Oga
On Wed, 3 Dec 2003, John Hasler wrote: good thread john :-) > > How does an attacker with a user-level password gain root access? > > In this case by exploiting a bug in sbrk(). The kernel developers knew > about the bug but did not believe it to be exploitable. They were wrong. > > > ...ho

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Vineet Kumar
* Monique Y. Herman ([EMAIL PROTECTED]) [031203 16:59]: > I have been wondering about the password-sniffing thing, too. If you > send a password using ssh, isn't it encrypted? > > I suppose some debian developer's kid sister could have installed a > keystroke logger on the dev machine ... um ...

fun - Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Alvin Oga
On Wed, 3 Dec 2003, Robert L. Harris wrote: > Your argument sounds like my 6yr old doing a "I want it now, I don't > care what your reasons are" soon followed by a temper tantrum. thats normal for the grown-ups too .. just a different form of "temper tantrum" and usually a shorter fuse tha

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Johnson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wed, Dec 03, 2003 at 01:58:11PM -0800, Vineet Kumar wrote: > Sidestepping lawsuits from a million angry customers isn't really a > "win". You're right. Which is why I really wish Bugtraq didn't wait around before publishing their findings. Custom

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Monique Y. Herman
On Wed, 03 Dec 2003 at 22:36 GMT, Alex Malinovich penned: > > --=-0wVW9GplMT9KFGFuBZNx Content-Type: text/plain > Content-Transfer-Encoding: quoted-printable > > On Wed, 2003-12-03 at 11:33, Dr. MacQuigg wrote: >> After reading the report at=20 >> http://lists.debian.org/debian-announce/debian-an

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Morgan
On Wed, 03 Dec 2003 10:33:34 -0700, Dr. MacQuigg wrote: > After reading the report at > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html > and following this newsgroup discussion, I have some very basic questions: > > 1) What is a "sniffed password", and how do they k

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Dave
After reading the report at http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html and following this newsgroup discussion, I have some very basic questions: 1) What is a "sniffed password", and how do they know the attacker used a password that was "sniffed", rather than j

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread John Hasler
Dr. MacQuigg writes: > What is a "sniffed password" A password gotten by reading each character as it is typed on the keyboard or by intercepting an unencrypted transmission. In this case it was the former. > ...and how do they know the attacker used a password that was "sniffed", > rather than

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread David Z Maze
(Not speaking for Debian at all.) "Dr. MacQuigg" <[EMAIL PROTECTED]> writes: > 1) What is a "sniffed password", and how do they know the attacker > used a password that was "sniffed", rather than just stolen out of > someone's notebook? It sounds like someone's personal machine got broken into,

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Alex Malinovich
On Wed, 2003-12-03 at 11:33, Dr. MacQuigg wrote: > After reading the report at > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html > and following this newsgroup discussion, I have some very basic questions: > > 1) What is a "sniffed password", and how do they know the a

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Benedict Verheyen
- Original Message - From: "Paul Morgan" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, December 03, 2003 6:01 PM Subject: Re: Debian Investigation Report after Server Compromises On Wed, 03 Dec 2003 16:25:21 +0100, Benedict Verheyen wrote: >>

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Dr. MacQuigg
After reading the report at http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html and following this newsgroup discussion, I have some very basic questions: 1) What is a "sniffed password", and how do they know the attacker used a password that was "sniffed", rather than j

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Morgan
On Wed, 03 Dec 2003 16:25:21 +0100, Benedict Verheyen wrote: >> I'm one of those who's got all his systems on safe kernels, even if this >> means I don't have full use. NICs on one box aren't supported by >> 2.4.18, and building 2.4.23 is turning into a bitch. > > Is there a page anywhere (if no

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Vineet Kumar
* Paul Johnson ([EMAIL PROTECTED]) [031202 23:01]: > On Tue, Dec 02, 2003 at 04:11:33PM -0500, Paul Morgan wrote: > > Ther is always a conflict between security and openness. MS's approach > > has always been not to say anything until a fix has been propagated; they > > are often criticized for t

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Morgan
On Tue, 02 Dec 2003 23:01:43 -0800, Paul Johnson wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On Tue, Dec 02, 2003 at 04:11:33PM -0500, Paul Morgan wrote: >> Ther is always a conflict between security and openness. MS's approach >> has always been not to say anything until a fix

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Morgan
On Wed, 03 Dec 2003 09:57:55 +, Oliver Elphick wrote: > > Suppose I go off for two weeks holiday? I'm the only one who can change > my system's kernel, but I leave it on because it is the gateway for > everyone else. The day after I leave, some idiot publishes details of > this exploit and

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Morgan
On Tue, 02 Dec 2003 23:08:07 -0800, Paul Johnson wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On Tue, Dec 02, 2003 at 06:17:44PM -0500, Paul Morgan wrote: >> It would be a lot less stable and secure if debian started >> publishing exploits. The announcement explains quite clearly

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Florian Ernst
Hello Benedict! On Wed, Dec 03, 2003 at 04:25:21PM +0100, Benedict Verheyen wrote: Is there a page anywhere (if not, there should be one) or info on what type of patches are added to a debianized kernel and where to find them. I don't know about a page, but I find a long list in /usr/share/doc/ker

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Benedict Verheyen
> I'm one of those who's got all his systems on safe kernels, even if this > means I don't have full use. NICs on one box aren't supported by > 2.4.18, and building 2.4.23 is turning into a bitch. Is there a page anywhere (if not, there should be one) or info on what type of patches are added to

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Karsten M. Self
on Tue, Dec 02, 2003 at 11:08:07PM -0800, Paul Johnson ([EMAIL PROTECTED]) wrote: > On Tue, Dec 02, 2003 at 06:17:44PM -0500, Paul Morgan wrote: > > It would be a lot less stable and secure if debian started > > publishing exploits. The announcement explains quite clearly what > > happened and how

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Karsten M. Self
on Tue, Dec 02, 2003 at 01:12:40PM -0600, Alex Malinovich ([EMAIL PROTECTED]) wrote: > On Tue, 2003-12-02 at 11:31, Greg Folkert wrote: > > Shoulda Been: > > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html > > > > What a wanker I am. No, Peter no comment needed. > Thank

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Karsten M. Self
on Wed, Dec 03, 2003 at 09:16:15AM -0500, Greg Folkert ([EMAIL PROTECTED]) wrote: > On Wed, 2003-12-03 at 02:03, Paul Johnson wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA1 > > > > On Tue, Dec 02, 2003 at 04:16:44PM -0500, Greg Folkert wrote: > > > On Tue, 2003-12-02 at 14:12, Alex M

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Greg Folkert
On Wed, 2003-12-03 at 02:08, Paul Johnson wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On Tue, Dec 02, 2003 at 06:17:44PM -0500, Paul Morgan wrote: > > It would be a lot less stable and secure if debian started > > publishing exploits. The announcement explains quite clearly what

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Greg Folkert
On Wed, 2003-12-03 at 02:04, Paul Johnson wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On Tue, Dec 02, 2003 at 09:41:15PM +, Oliver Elphick wrote: > > Because there will be lots of people who haven't yet had the chance to > > upgrade. They won't thank us for making an exploit

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Johnson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Wed, Dec 03, 2003 at 09:16:15AM -0500, Greg Folkert wrote: > On Wed, 2003-12-03 at 02:03, Paul Johnson wrote: > > On Tue, Dec 02, 2003 at 04:16:44PM -0500, Greg Folkert wrote: > > > On Tue, 2003-12-02 at 14:12, Alex Malinovich wrote: > > > > I'm afr

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Greg Folkert
On Wed, 2003-12-03 at 02:03, Paul Johnson wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On Tue, Dec 02, 2003 at 04:16:44PM -0500, Greg Folkert wrote: > > On Tue, 2003-12-02 at 14:12, Alex Malinovich wrote: > > > I'm afraid I'm part of the group that just doesn't understand. This > >

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Robert L. Harris
Hmmm. A friend of mine works at a company with over 500 machines in the field. Many of them are customer facing. There are more than 1 configuration on the servers. He has to compile each config and run it through a dev/test and a full regression before he can update any production machine

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Oliver Elphick
On Wed, 2003-12-03 at 07:04, Paul Johnson wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On Tue, Dec 02, 2003 at 09:41:15PM +, Oliver Elphick wrote: > > Because there will be lots of people who haven't yet had the chance to > > upgrade. They won't thank us for making an exploit

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Johnson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Dec 02, 2003 at 06:17:44PM -0500, Paul Morgan wrote: > It would be a lot less stable and secure if debian started > publishing exploits. The announcement explains quite clearly what > happened and how to protect your system. Why does BugTraq

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Johnson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Dec 02, 2003 at 09:41:15PM +, Oliver Elphick wrote: > Because there will be lots of people who haven't yet had the chance to > upgrade. They won't thank us for making an exploit available to every > would-be cracker. Why should we cater

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Johnson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Dec 02, 2003 at 04:16:44PM -0500, Greg Folkert wrote: > On Tue, 2003-12-02 at 14:12, Alex Malinovich wrote: > > I'm afraid I'm part of the group that just doesn't understand. This > > snippet reeks of security through obscurity for me. If the h

Re: Debian Investigation Report after Server Compromises

2003-12-03 Thread Paul Johnson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Dec 02, 2003 at 04:11:33PM -0500, Paul Morgan wrote: > Ther is always a conflict between security and openness. MS's approach > has always been not to say anything until a fix has been propagated; they > are often criticized for that, but I'm

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Scott C. Linnenbringer
On Tue, Dec 02, 2003, at 15:01 -0600, Preston Boyington wrote: > >Though I am somewhat concerned about the following bit from the > >message: > > > > "Please understand that we cannot give away the used exploit to > > random people who we don't know. So please don't ask us about it." > > > > I

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread John Hasler
Hugo writes: > There would seem to be a misnomer, "script-kiddies" can come up with an > exploit like this and still be "kiddies"? Script-kiddies don't come up with anything. Crackers come up with exploits and give to the kiddies to play with. -- John Hasler [EMAIL PROTECTED] (John Hasler) Danci

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Hugo Vanwoerkom
John Hasler wrote: dman writes: The only thing I have to add, apart from noting above that the exploit was divulged... The _bug_ was divulged. The exploit is so difficult that the kernel hackers didn't think the bug was exploitable. There would seem to be a misnomer, "script-kiddies" can come u

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread John Hasler
dman writes: > The only thing I have to add, apart from noting above that the exploit > was divulged... The _bug_ was divulged. The exploit is so difficult that the kernel hackers didn't think the bug was exploitable. -- John Hasler [EMAIL PROTECTED] (John Hasler) Dancing Horse Hill Elmwood, WI

RE: Debian Investigation Report after Server Compromises

2003-12-02 Thread Paul Morgan
On Tue, 02 Dec 2003 15:01:48 -0600, Preston Boyington wrote: > > I agree. I support and recommend Debian to my peers and clients on the > basis that Debian is a stable and secure distribution. Therefore when > something (such as this) happens I want to have full disclosure so I can > confidentl

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Derrick 'dman' Hudson
On Tue, Dec 02, 2003 at 01:12:40PM -0600, Alex Malinovich wrote: | Thanks for the link. It certainly makes for interesting reading. Though | I am somewhat concerned about the following bit from the message: | | "Please understand that we cannot give away the used exploit to random | people who we

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Paul Morgan
On Tue, 02 Dec 2003 13:12:40 -0600, Alex Malinovich wrote: > On Tue, 2003-12-02 at 11:31, Greg Folkert wrote: >> Shoulda Been: >> http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html >> >> What a wanker I am. No, Peter no comment needed. >> >> On Tue, 2003-12-02 at 11:08, G

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Oliver Elphick
On Tue, 2003-12-02 at 19:12, Alex Malinovich wrote: > I'm afraid I'm part of the group that just doesn't understand. This > snippet reeks of security through obscurity for me. If the hole has been > identified and, presumably, fixed, why not tell people about it? Because there will be lots of peop

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Greg Folkert
On Tue, 2003-12-02 at 14:12, Alex Malinovich wrote: > On Tue, 2003-12-02 at 11:31, Greg Folkert wrote: > > Shoulda Been: > > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html > > > > What a wanker I am. No, Peter no comment needed. > > > > On Tue, 2003-12-02 at 11:08, Gre

RE: Debian Investigation Report after Server Compromises

2003-12-02 Thread Preston Boyington
Title: RE: Debian Investigation Report after Server Compromises >Though I am somewhat concerned about the following bit from the message: > > "Please understand that we cannot give away the used exploit to random > people who we don't know.  So please don't ask us

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Peter Whysall
Greg Folkert wrote: Shoulda Been: http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html What a wanker I am. No, Peter no comment needed. On Tue, 2003-12-02 at 11:08, Greg Folkert wrote: http://lists.debian.org/debian-announce/debian-announce-2003/msg3.htmlDebian :-D Wh

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Alex Malinovich
On Tue, 2003-12-02 at 11:31, Greg Folkert wrote: > Shoulda Been: > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html > > What a wanker I am. No, Peter no comment needed. > > On Tue, 2003-12-02 at 11:08, Greg Folkert wrote: > > > http://lists.debian.org/debian-announce/deb

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Arnt Karlsen
On Tue, 02 Dec 2003 11:08:57 -0500, Greg Folkert <[EMAIL PROTECTED]> wrote in message <[EMAIL PROTECTED]>: > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.htmlDebian > ..he meant: http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html -- ..med ven

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Tom
On Tue, Dec 02, 2003 at 11:08:57AM -0500, Greg Folkert wrote: > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.htmlDebian That's a killer incident report. I'm satisfied. Couldn't help thinking about horses and barn doors though. I expect we'll see the "what next" next :

Re: Debian Investigation Report after Server Compromises

2003-12-02 Thread Greg Folkert
Shoulda Been: http://lists.debian.org/debian-announce/debian-announce-2003/msg3.html What a wanker I am. No, Peter no comment needed. On Tue, 2003-12-02 at 11:08, Greg Folkert wrote: > http://lists.debian.org/debian-announce/debian-announce-2003/msg3.htmlDebian -- [EMAIL PROTECTED] REMEM