Re: Testing needed for xorg-server security update

2014-12-10 Thread AreYouLoco?
I don't know if my system was proper one to make tests but... Wow that was pain in the ass to go thru all of this X configuration (again..:P) So. The steps I made. I wanted to test this on my hardware. I've installed all the packages for my arch (i386) but then it broke my X. So I only left this o

Re: Testing needed for xorg-server security update

2014-12-10 Thread Jörg-Volker Peetz
At second glance, I noticed these packages are for Wheezy/stable. So the experimental archive is not appropriate for these packages. These fixes seem to be not included in the sid packages yet? -- Regards, jvp. -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of

Re: Testing needed for xorg-server security update

2014-12-10 Thread Jörg-Volker Peetz
Why not put these packages into experimental? It would make testing easier, at least for me. Thanks for your caring. -- Regards, jvp. -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https:

Re: Testing needed for xorg-server security update

2014-12-10 Thread Yves-Alexis Perez
On mer., 2014-12-10 at 06:56 +0100, Moritz Muehlenhoff wrote: > Hi, > there's been a new release of xorg-server fixing multiple security > vulnerabilities: > http://lists.x.org/archives/xorg-announce/2014-December/002500.html > > The update is ready for Wheezy/stable and has been successfully tes

Testing needed for xorg-server security update

2014-12-09 Thread Moritz Muehlenhoff
Hi, there's been a new release of xorg-server fixing multiple security vulnerabilities: http://lists.x.org/archives/xorg-announce/2014-December/002500.html The update is ready for Wheezy/stable and has been successfully tested on an Intel graphics adapter. But since different hardware will exer

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-12 Thread owens
> On Wed, Apr 09, 2008 at 08:49:29AM +1200, Chris Bannister wrote: >> On Sun, Apr 06, 2008 at 10:46:25AM -0500, Dave Sherohman wrote: >> > My (admittedly limited) understanding of public key crypto is that the >> > public and private key are connected by the relationship of two >> extremly >> > lar

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-10 Thread Dave Sherohman
On Wed, Apr 09, 2008 at 08:49:29AM +1200, Chris Bannister wrote: > On Sun, Apr 06, 2008 at 10:46:25AM -0500, Dave Sherohman wrote: > > My (admittedly limited) understanding of public key crypto is that the > > public and private key are connected by the relationship of two extremly > > large prime

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-08 Thread Chris Bannister
On Sun, Apr 06, 2008 at 10:46:25AM -0500, Dave Sherohman wrote: > On Fri, Apr 04, 2008 at 02:43:58AM +0200, s. keeling wrote: > > Brian McKee <[EMAIL PROTECTED]>: > > > On 3-Apr-08, at 1:23 PM, Dave Sherohman wrote: > > > > Unless they take the time to successfully factor the > > > > public key, >

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-06 Thread Douglas A. Tutty
On Sun, Apr 06, 2008 at 10:46:25AM -0500, Dave Sherohman wrote: > In practice, any decent public key system will use large enough primes > that this is a "Got a supercomputer or a botnet and a good bit of time?" > case which makes brute-forcing an md5 password file look easy, but I > like to be c

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-06 Thread Dave Sherohman
On Fri, Apr 04, 2008 at 02:43:58AM +0200, s. keeling wrote: > Brian McKee <[EMAIL PROTECTED]>: > > On 3-Apr-08, at 1:23 PM, Dave Sherohman wrote: > > > Unless they take the time to successfully factor the > > > public key, > > > > Can you expand on that sentence? I'm not sure what you meant by

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-04 Thread Celejar
On Thu, 3 Apr 2008 12:23:34 -0500 Dave Sherohman <[EMAIL PROTECTED]> wrote: [snip] > When using public key auth, copy *only* your public key to the server. > (ssh-copy-id is a handy way to automate this.) So long as your private > key remains secure, there is very little risk to an attacker gett

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-03 Thread s. keeling
Brian McKee <[EMAIL PROTECTED]>: > On 3-Apr-08, at 1:23 PM, Dave Sherohman wrote: > > Unless they take the time to successfully factor the > > public key, > > Can you expand on that sentence? I'm not sure what you meant by it. I imagine he means a brute force crack. Got a supercomputer or bot

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-03 Thread s. keeling
Douglas A. Tutty <[EMAIL PROTECTED]>: > > Well, does the desktop need to run sshd at all, and if so, does it need > to listen to "outside" addresses? If not, and you've deactivated > password logins and you've deactivated root logins, you could give > anyone the root password and there's noth

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-03 Thread Douglas A. Tutty
On Wed, Apr 02, 2008 at 08:33:34PM -0500, Russell L. Harris wrote: > * s. keeling <[EMAIL PROTECTED]> [080402 19:28]: > > Russell L. Harris <[EMAIL PROTECTED]>: > > > > > If the server's compromised, you should reinstall. > > My concern is not for corruption of the server. My concern is whethe

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-03 Thread Brian McKee
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 3-Apr-08, at 1:23 PM, Dave Sherohman wrote: Unless they take the time to successfully factor the public key, Can you expand on that sentence? I'm not sure what you meant by it. Other than that I wholeheartedly agree with the suggestion to use

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-03 Thread Dave Sherohman
On Wed, Apr 02, 2008 at 10:33:35AM -0500, Russell L. Harris wrote: > It is convenient to use "scp" for transferring files between the > desktop machine in the LAN and the server, and to use "ssh" for > remote maintenance of the server, again from the desktop machine > in the LAN. A

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-03 Thread s. keeling
Russell L. Harris <[EMAIL PROTECTED]>: > > In other words, if I were to give you free access to my server, so > that you could inspect all the system files, would you be able to > deduce the password and passphrase, which are the same as those which > I use on the desktop machine? You just de

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-02 Thread Russell L. Harris
* s. keeling <[EMAIL PROTECTED]> [080402 19:28]: > Russell L. Harris <[EMAIL PROTECTED]>: > > > If the server's compromised, you should reinstall. My concern is not for corruption of the server. My concern is whether -- if I employ on the server the same password and passphrase which I employ

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-02 Thread s. keeling
Russell L. Harris <[EMAIL PROTECTED]>: > > Is there a major or unreasonable security risk if the sysop creates > on the server an account with the same username, password, and > passphrase as his account on the desktop machine? Same username is a convenience, account passwords need not be the sam

server security :: user accounts, ssh, passphrases, etc.

2008-04-02 Thread Russell L. Harris
SYSTEM: (1) firewall/router (SmoothWall Express 2.0) which (using NAT) provides and protects both a "green" zone for a LAN and an "orange" zone ("DMZ") for a publicly-accessible server (2) ftp or http server in the DMZ (3) desktop machine in the LAN from which the sysop

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-01 Thread Jochen Schulz
Russell L. Harris: > > Such remote maintenance of the server from a machine in the LAN > becomes tedious unless there is on each machine an account with > the same username, password, and passphrase. Not true. You can log into another machine with any username you want. Either you pro

Re: server security :: user accounts, ssh, passphrases, etc.

2008-04-01 Thread Owen Townend
On 01/04/2008, Russell L. Harris <[EMAIL PROTECTED]> wrote: > > SYSTEM: > > (1) firewall/router (SmoothWall Express 2.0) which (using NAT) > provides and protects both a "green" zone for a LAN and an > "orange" zone ("DMZ") for a publicly-accessible server > > (2) ftp or http server

server security :: user accounts, ssh, passphrases, etc.

2008-04-01 Thread Russell L. Harris
SYSTEM: (1) firewall/router (SmoothWall Express 2.0) which (using NAT) provides and protects both a "green" zone for a LAN and an "orange" zone ("DMZ") for a publicly-accessible server (2) ftp or http server in the DMZ (3) desktop machine in the LAN from which the sysop

Re: Apache web server security help

2007-03-06 Thread Roberto C. Sanchez
On Tue, Mar 06, 2007 at 02:08:24PM +, david robert wrote: > Hi, > > I am running apache 2.0.54 version and one of security audit tool found the > following > Vulnerability > > Apache Web Server ETag Header Information Disclosure Weakness > > more information located here

Apache web server security help

2007-03-06 Thread david robert
Hi, I am running apache 2.0.54 version and one of security audit tool found the following Vulnerability Apache Web Server ETag Header Information Disclosure Weakness more information located here http://www.securityfocus.com/bid/6939 How to fix this problem Than

Re: X server security defaults.

2005-07-26 Thread Douglas Ward
On Tuesday 26 July 2005 08:15, pier wrote: > wim wrote: > > Doesn't kde has a "run-as" function? There's such a function in gnome... > > In Gnome is gksu. > Or you could use sudo. > > > Pier Also, in KDE the [Alt]+[F2] dialog has a "run as user" option under the "Options" button. -- To UNSUBSC

Re: X server security defaults.

2005-07-26 Thread pier
wim wrote: > Doesn't kde has a "run-as" function? There's such a function in gnome... In Gnome is gksu. Or you could use sudo. Pier -- Un uomo saggio impara dall' esperienza. Un uomo ancora più saggio impara dall'esperienza degli altri signature.asc Description: OpenPGP digital signature

Re: X server security defaults.

2005-07-26 Thread pier
wim wrote: > Doesn't kde has a "run-as" function? There's such a function in gnome... In Gnome is gksu. Or you could use sudo. Pier -- Un uomo saggio impara dall' esperienza. Un uomo ancora più saggio impara dall'esperienza degli altri signature.asc Description: OpenPGP digital signature

Re: X server security defaults.

2005-07-24 Thread wim
[EMAIL PROTECTED] wrote: I am running Debian Sarge on a simple single-user desktop system. My X display is started by kdm. By default, Debian configures the X server to allow connections only by the user logged into the machine through kdm. If I want to start an X client by another user (e.g.

X server security defaults.

2005-07-22 Thread gg . 1 . ethanr
I am running Debian Sarge on a simple single-user desktop system. My X display is started by kdm. By default, Debian configures the X server to allow connections only by the user logged into the machine through kdm. If I want to start an X client by another user (e.g. start vim-gtk as su'd root

Re: Server Security

2004-12-19 Thread Paul Johnson
On Sunday 19 December 2004 1:16 am, Jeffrin Thalakkottoor wrote: > How To Configure It On The Server Side ... > > Configure The Server That A File On The Server Can > Only Be Viewed But Not Downloaded. You don't. RIAA and MPAA are learning this the hard way: If you can view it, you can copy it

Re: Server Security

2004-12-19 Thread Sam Watkins
On Sun, Dec 19, 2004 at 09:29:28AM +, Dave Ewart wrote: > On Sunday, 19.12.2004 at 09:16 +, Jeffrin Thalakkottoor wrote: > > How To Configure It On The Server Side ... > > > > Configure The Server That A File On The Server Can > > Only Be Viewed But Not Downloaded. > > In order to 'view'

Re: Server Security

2004-12-19 Thread Dave Ewart
On Sunday, 19.12.2004 at 09:16 +, Jeffrin Thalakkottoor wrote: > How To Configure It On The Server Side ... > > Configure The Server That A File On The Server Can > Only Be Viewed But Not Downloaded. In order to 'view' you *have* to have already downloaded the file. What you suggest cannot

Server Security

2004-12-19 Thread Jeffrin Thalakkottoor
How To Configure It On The Server Side ... Configure The Server That A File On The Server Can Only Be Viewed But Not Downloaded. = Birthdays --- 1869 Henri Matisse (artist) - December 31 1976 Jeffrin Jose (Hobby Sinner) - December 31 _

Server security statictics

1999-07-17 Thread Frisco Rose
Greeting, I am running a slink server for http access and our campus has been recently getting a lot of redhat boxes hacked. My question is, are there any statistics on debian and/or redhat security breaches? I follow comp.risks fairly regularly and haven't seen anything about this. Also, has ther