From owner-freebsd-security Sun Dec 16 0: 8: 7 2001
Delivered-To: freebsd-security@freebsd.org
Received: from noname.csdl.lt (noname.csdl.lt [194.176.40.182])
by hub.freebsd.org (Postfix) with SMTP id 09B4E37B419
for ; Sun, 16 Dec 2001 00:07:57 -0800 (PST)
Received: (qmail 61026 invoked by uid 1000); 16 Dec 2001 08:07:55 -0000
Date: Sun, 16 Dec 2001 10:07:55 +0200
From: Paulius Bulotas
To: freebsd-security@freebsd.org
Subject: Re: okay now I am worried
Message-ID: <20011216080755.GA60984@noname>
Mail-Followup-To: freebsd-security@freebsd.org
References: <000001c184f6$133d72e0$fa01a8c0@rjstech.com> <20011214175310.D3473@blossom.cjclark.org> <20011215105636.B338@Picasso.Zahemszky.HU>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <20011215105636.B338@Picasso.Zahemszky.HU>
User-Agent: Mutt/1.3.24i
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Hi,
On 01 12 15, Zahemszky Gábor wrote:
> 1) (from sendmail manual): uncomment the biff port in /etc/services
> (if you didn't install any other MTA)
> 2) edit /etc/mail/sendmail.cf, and change in the Mlocal part:
in my case that was procmail, which by default compiles with COMSAT
enabled... if this the case, just reinstall port deisabling COMSAT
(cd work/procmail... and grep -ir COMSAT * and figure out correct
#define ;)
Regards,
Paulius
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 16 6:47: 4 2001
Delivered-To: freebsd-security@freebsd.org
Received: from smtp2.mx.pitdc1.stargate.net (smtp2.mx.pitdc1.stargate.net [206.210.69.142])
by hub.freebsd.org (Postfix) with SMTP id 2D08C37B41B
for ; Sun, 16 Dec 2001 06:46:53 -0800 (PST)
Received: (qmail 5468 invoked from network); 16 Dec 2001 14:46:41 -0000
Received: from 1cust102.tnt3.bakersfield.ca.da.uu.net (HELO localhost) (63.48.184.102)
by smtp2.mx.pitdc1.stargate.net with SMTP; 16 Dec 2001 14:46:41 -0000
X-Sender: jackieg@stargate.net
From: Jack Green
To: "Mortgage Borrower"
Date: Sun, 16 Dec 2001 06:58:52 -0800
Subject: Need a Home Loan? Let Us Help!
Reply-To: jackieg@stargate.net
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="----=_NextPart_000_001__761153522_25132.69"
Message-Id: <20011216144653.2D08C37B41B@hub.freebsd.org>
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
This is a Multipart MIME message.
------=_NextPart_000_001__761153522_25132.69
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 7bit
------=_NextPart_000_001__761153522_25132.69
Content-Type: text/html; charset=iso-8859-1
Content-Transfer-Encoding: base64
DQoNCjxIVE1MPg0KDQo8aGVhZD4NCjxNRVRBIEhUVFAtRVFVSVY9IkNvbnRlbnQtVHlwZSIg
Q09OVEVOVD0idGV4dC9odG1sO2NoYXJzZXQ9aXNvLTg4NTktMSI+DQo8IURPQ1RZUEUgSFRN
TCBQVUJMSUMgIi0vL1czQy8vRFREIEhUTUwgNC4wIFRyYW5zaXRpb25hbC8vRU4iPg0KPFRJ
VExFPkZyZWUgUmF0ZSBRdW90ZTwvVElUTEU+DQo8TUVUQSBjb250ZW50PSJ0ZXh0L2h0bWw7
IGNoYXJzZXQ9aXNvLTg4NTktMSIgaHR0cC1lcXVpdj1Db250ZW50LVR5cGU+PFhNRVRBIA0K
Y29udGVudD0iTW96aWxsYS80LjcgW2VuXSAoV2luOTg7IEkpIFtOZXRzY2FwZV0iIG5hbWU9
IkdFTkVSQVRPUiI+DQo8TUVUQSBjb250ZW50PSJNaWNyb3NvZnQgRnJvbnRQYWdlIDQuMCIg
bmFtZT1HRU5FUkFUT1I+DQo8U1RZTEU+PC9TVFlMRT4NCjwvSEVBRD4NCjxCT0RZIGJhY2tn
cm91bmQ9aHR0cDovLzIxNi4xMTAuMTc5LjIyL21vbmV5X2dyLmpwZyBiZ0NvbG9yPSNmZmZm
ZmYgYmdwcm9wZXJ0aWVzPSJmaXhlZCI+DQo8RElWIHN0eWxlPSJGT05UOiAxMHB0IGFyaWFs
Ij4NCjxESVY+Jm5ic3A7PC9ESVY+PC9ESVY+DQo8RElWPjxCUj48L0RJVj4NCjxCUj4NCg0K
DQo8UCBhbGlnbj1jZW50ZXI+PGVtPjxiPjxmb250IGNvbG9yPSIjZmYwMDAwIiBzaXplPSI2
IiBmYWNlPSJhcmlhbCI+JnF1b3Q7UmVmaW5hbmNlIFlvdXINCkN1cnJlbnQgTW9ydGdhZ2Ug
V2hpbGUgUmF0ZXMgQXJlIExPVyEhJnF1b3Q7PC9mb250PjwvYj48L2VtPjwvUD4NCjxNQVJR
VUVFPjxpPjxiPjxGT05UIHNpemU9NCBjb2xvcj0jMDAwMGZmPkhPTUUgRVFVSVRZIExPQU5T
ICoqKiBKVU1CTyBMT0FOUyAqKiogSE9NRSBJTVBST1ZFTUVOVCBMT0FOUyAqKiogDQogICAg
ICBERUJUIENPTlNPTElEQVRJT04gTE9BTlMgKioqIFJFRklOQU5DRSBMT0FOUyAqKiogQUxM
IEFSRSBBVkFJTEFCTEUgVE8gWU9VICoqKiBSQVRFUyBBUyBMT1cgQVMgDQogICAgICAzLjk1
JTwvZm9udD48L2I+PC9pPjwvbWFycXVlZT4NCjxCUj48QlI+DQo8cCBhbGlnbj0iY2VudGVy
Ij48Yj48Zm9udCBzaXplPSI0Ij5Nb3J0Z2FnZSBSYXRlcyBBcmUgU28gTG93ISZuYnNwOzwv
Zm9udD48L2I+PC9wPg0KPHAgYWxpZ249ImNlbnRlciI+PGI+PGZvbnQgc2l6ZT0iNCI+WW91
IENhbiBTYXZlIFRob3VzYW5kcyBPZiBEb2xsYXJzIEJ5IFRha2luZw0KQWR2YW50YWdlIE5v
dyE8L2ZvbnQ+PC9iPjwvcD4NCjxQIGFsaWduPWNlbnRlcj48RU0+PEI+PEZPTlQgY29sb3I9
I2ZmMDAwMCBzaXplPTU+JnF1b3Q7V0UgQVJFIEFOIEFTU09DSUFUSU9OIE9GDQpNT1JUR0FH
RSBCUk9LRVJTIEFORCBMRU5ERVJTIDwvRk9OVD48L0I+PC9FTT48L1A+DQo8UCBhbGlnbj1j
ZW50ZXI+PEVNPjxCPjxGT05UIGNvbG9yPSNmZjAwMDAgc2l6ZT01PldJVEggVEhFIEJFU1Qg
UkFURVMgQU5EIFRIRSBMT1dFU1QNCkNPU1RTISZxdW90PC9GT05UPjwvQj48L0VNPjwvUD4N
CjxwIGFsaWduPSJjZW50ZXIiPiZuYnNwOzwvcD4NCjxQIGFsaWduPWNlbnRlcj48Rk9OVCBj
b2xvcj0jMDAwMGZmIHNpemU9ND48Qj5XZSZuYnNwO2hhdmUgdGhvdXNhbmRzIG9mIGxvYW4g
DQpwcm9ncmFtcyB0aHJvdWdoIGh1bmRyZWRzIG9mIGxlbmRlcnMhPEJSPjwvQj48L0ZPTlQ+
PEZPTlQgc2l6ZT0zPjwvRk9OVD48L1A+DQo8UCBhbGlnbj1jZW50ZXI+PFNUUk9ORz48Rk9O
VCBzaXplPTU+WW91IGNhbiBjaG9vc2UgZnJvbSZuYnNwOyJBZGp1c3RhYmxlIFJhdGUNCk1v
cnRnYWdlcyANCmFzIGxvdyBhcyAzLjk1JSZxdW90OzwvRk9OVD48L1NUUk9ORz48L1A+DQo8
UCBhbGlnbj1jZW50ZXI+PFNUUk9ORz48Rk9OVCBzaXplPTU+YW5kJm5ic3A7IkZpeGVkIFJh
dGUgTW9ydGdhZ2VzIGFzIGxvdyBhcw0KNi4wMCUmbmJzcDs8L0ZPTlQ+PC9TVFJPTkc+PC9Q
Pg0KPFAgYWxpZ249Y2VudGVyPjxTVFJPTkc+PEZPTlQgc2l6ZT01PmFsbCB3aXRoIHRoZSBs
b3dlc3QgY29zdHMgaW4gdGhlDQpOYXRpb24hJnF1b3Q7PC9GT05UPjwvU1RST05HPjxCSUc+
PEJJRz48Rk9OVCBjb2xvcj0jZmYwMDAwPio8L0ZPTlQ+PC9CSUc+PC9CSUc+PC9QPg0KPFAg
YWxpZ249Y2VudGVyPjxGT05UIA0Kc2l6ZT01Pjxmb250IGNvbG9yPSIjRkYwMDAwIj4mcXVv
dDs8Yj48aT5ZT1UgQ0FOIDx1PkJVWSBET1dOIFlPVVIgSU5URVJFU1QgUkFURTwvdT4NClRP
PC9pPjwvYj48L2ZvbnQ+PC9GT05UPjwvUD4NCjxQIGFsaWduPWNlbnRlcj48Zm9udCBjb2xv
cj0iI0ZGMDAwMCIgc2l6ZT0iNSI+PGI+PGk+QVMgTE9XIEFTIFlPVSBDQU4NCkFGRk9SRCEm
cXVvdDs8L2k+PC9iPjwvZm9udD48Rk9OVCANCnNpemU9NT48QlI+PC9GT05UPjxGT05UIHNp
emU9Mz48L0ZPTlQ+PC9QPg0KPFAgYWxpZ249Y2VudGVyPjxGT05UIHNpemU9KzA+PEZPTlQg
Y29sb3I9IzAwMDBmZiBzaXplPTI+PEJJRz48QklHPjxGT05UIA0KY29sb3I9I2ZmMDAwMCBz
aXplPTU+KjwvRk9OVD48L0JJRz48U1RST05HPkFsbCByYXRlcyBhcmUgYmFzZWQgb24gDQpx
dWFsaWZpY2F0aW9uPC9TVFJPTkc+ITwvQklHPjwvRk9OVD48L0ZPTlQ+PC9QPg0KPFAgYWxp
Z249Y2VudGVyPjxGT05UIHNpemU9KzA+PEZPTlQgc2l6ZT0yPjxCSUc+PC9CSUc+PC9GT05U
PjxGT05UIA0KY29sb3I9IzAwMDBmZj48Rk9OVCBmYWNlPUFyaWFsPjxGT05UIHNpemU9Mj48
QSBocmVmPSJodHRwOi8vMjE2LjExMC4xNzkuMjIiIA0KdGFyZ2V0PV9ibGFuaz48Rk9OVCBz
aXplPTU+PFNUUk9ORz48Rk9OVCBmYWNlPSJUaW1lcyBOZXcgUm9tYW4iPkNsaWNrIGhlcmUg
Zm9yIA0KeW91ciA8L0ZPTlQ+PEZPTlQgc2l6ZT02PjxGT05UIGZhY2U9IlRpbWVzIE5ldyBS
b21hbiI+PEVNPiJGUkVFIFJBVEUgDQpRVU9URSIhPC9FTT48L0ZPTlQ+PC9GT05UPjwvU1RS
T05HPjwvRk9OVD48L0E+PC9GT05UPjwvRk9OVD48L0ZPTlQ+PC9GT05UPjwvUD4NCjxQIGFs
aWduPWxlZnQ+Jm5ic3A7PC9QPg0KPFAgYWxpZ249bGVmdD48aT48Yj48Zm9udCBmYWNlPSJB
cmlhbCIgc2l6ZT0iKzAiPkNMSUNLIE9OIExPQU5TIEJFTE9XIEZPUiBZT1VSDQpGUkVFIEFQ
UExJQ0FUSU9OITwvZm9udD48L2I+PC9pPjxGT05UIGZhY2U9QXJpYWw+PEJSPjwvRk9OVD48
L1A+DQo8UCBhbGlnbj1sZWZ0PjxTVFJPTkc+PEVNPjxBIGhyZWY9Imh0dHA6Ly8yMTYuMTEw
LjE3OS4yMiIgDQp0YXJnZXQ9X2JsYW5rPjxmb250IHNpemU9IjUiIGNvbG9yPSIjODAwMDgw
Ij5QdXJjaGFzZSBMb2FuczwvZm9udD48L0E+IDxGT05UIHNpemU9NT4NCjwvRk9OVD4gPC9F
TT48Rk9OVCANCnNpemU9ND4tIDxFTT5UaG91c2FuZHMgb2YgcHJvZ3JhbXMgDQpmb3IgRmly
c3QgTW9ydGdhZ2VzITwvRU0+PC9GT05UPjxJPjwvST48L1NUUk9ORz48ST48Rk9OVCANCmNv
bG9yPSMwMDAwMDA+PEJSPjxCUj48L0ZPTlQ+PC9JPjxBIGhyZWY9Imh0dHA6Ly8yMTYuMTEw
LjE3OS4yMiIgX2JsYW5rPz48RU0+PFNUUk9ORz48Zm9udCBzaXplPSI1IiBjb2xvcj0iIzgw
MDA4MCI+UmVmaW5hbmNlIExvYW5zPC9mb250PjwvU1RST05HPjwvRU0+PEk+PEZPTlQgDQpj
b2xvcj0jMDAwMDAwIHNpemU9Mj4gPC9GT05UPjwvST48L0E+PEk+PEZPTlQgY29sb3I9IzAw
MDAwMCBzaXplPTQ+LSA8Qj5SZWR1Y2UgeW91ciANCm1vbnRobHkgcGF5bWVudHMgYW5kPC9G
T05UPjxGT05UIGNvbG9yPSMwMDAwMDAgc2l6ZT0yPiA8L0ZPTlQ+PEZPTlQgDQpjb2xvcj0j
ZmYwMDAwIHNpemU9NT5HZXQgQ2FzaCBCYWNrITwvRk9OVD48L0I+PEZPTlQgY29sb3I9IzAw
MDAwMCBzaXplPTQ+IA0KPC9GT05UPjxGT05UIGNvbG9yPSMwMDAwMDAgc2l6ZT0zPjxCUj48
QlI+PC9GT05UPjwvST48QSANCmhyZWY9Imh0dHA6Ly8yMTYuMTEwLjE3OS4yMiIgdGFyZ2V0
PV9ibGFuaz48Zm9udCBjb2xvcj0iIzgwMDA4MCI+PEVNPjxCPjxGT05UIHNpemU9NT5TZWNv
bmQgDQpNb3J0Z2FnZXM8L0ZPTlQ+PC9CPjwvRU0+PEk+PEZPTlQgc2l6ZT0zPiA8L0ZPTlQ+
PC9JPg0KPC9mb250PiA8L0E+PEk+PEZPTlQgY29sb3I9IzAwMDAwMCBzaXplPTM+IC0gPC9G
T05UPjxCPjxGT05UIA0KY29sb3I9IzAwMDAwMCBzaXplPTQ+V2UgY2FuIGhlbHAgeW91IGdl
dCBmcm9tIDwvRk9OVD48Rk9OVCBjb2xvcj0jZmYwMDAwIA0Kc2l6ZT01PjkwJTwvRk9OVD48
Rk9OVCBjb2xvcj0jMDAwMDAwIHNpemU9ND4gdXAgdG8gPC9GT05UPjxGT05UIGNvbG9yPSNm
ZjAwMDAgDQpzaXplPTU+MTI1JTwvRk9OVD48Rk9OVCBjb2xvcj0jMDAwMDAwIHNpemU9ND4g
b2YgeW91ciBob21lcyB2YWx1ZSEgKHJhdGlvcyB2YXJ5IA0KYnkgc3RhdGUpPC9GT05UPjwv
Qj48L1A+DQo8UCBhbGlnbj1sZWZ0PjxBIGhyZWY9Imh0dHA6Ly8yMTYuMTEwLjE3OS4yMiIg
DQp0YXJnZXQ9X2JsYW5rPjxCPjxmb250IHNpemU9IjUiIGNvbG9yPSIjODAwMDgwIj5EZWJ0
IENvbnNvbGlkYXRpb248L2ZvbnQ+PC9CPjwvQT48Rk9OVCBjb2xvcj0jMDAwMDAwIHNpemU9
Mz4gPEZPTlQgY29sb3I9IzAwMDAwMCBzaXplPTQ+LSANCjxCPkNvbWJpbmUgPC9GT05UPjxG
T05UIGNvbG9yPSNmZjAwMDAgc2l6ZT01PmFsbDwvRk9OVD48Rk9OVCBjb2xvcj0jMDAwMDAw
IA0Kc2l6ZT00PiB5b3VyIGJpbGxzIGludG8gPC9GT05UPjxGT05UIGNvbG9yPSNmZjAwMDAg
c2l6ZT01Pk9uZSBMb3cgTW9udGhseSANClBheW1lbnQhPC9GT05UPjwvQj48QlI+PEJSPjwv
Rk9OVD48Qj48QSANCmhyZWY9Imh0dHA6Ly8yMTYuMTEwLjE3OS4yMiIgdGFyZ2V0PV9ibGFu
az48Zm9udCBzaXplPSI1IiBjb2xvcj0iIzgwMDA4MCI+Rmlyc3QgVGltZSBIb21lIEJ1eWVy
czwvZm9udD48L0E+PEZPTlQgY29sb3I9IzAwMDAwMCBzaXplPTM+IC0gDQo8Rk9OVCBjb2xv
cj0jMDAwMDAwIHNpemU9ND5XZSBjYW4gaGVscCB5b3UgYnV5IHdpdGggPEZPTlQgY29sb3I9
I2ZmMDAwMCANCnNpemU9NT5Mb3c8L0ZPTlQ+PC9GT05UPjxGT05UIGNvbG9yPSNmZjAwMDAg
c2l6ZT01PiBNb25leSBEb3duPC9GT05UPjxGT05UIA0KY29sb3I9IzAwMDAwMCBzaXplPTQ+
LCBhbmQgZXZlbiA8L0ZPTlQ+PEZPTlQgY29sb3I9I2ZmMDAwMCBzaXplPTU+R2V0IENhc2gg
DQpCYWNrITwvRk9OVD48L0ZPTlQ+PC9CPjwvUD48L0k+DQo8UCBhbGlnbj1jZW50ZXI+PEJJ
Rz48QklHPjxGT05UIGNvbG9yPSNmZjAwMDA+KjwvRk9OVD48L0JJRz5BbGwgcmF0ZXMgYXJl
IGJhc2VkIA0Kb24gcXVhbGlmaWNhdGlvbiE8L0JJRz48L1A+DQo8UCBhbGlnbj1jZW50ZXI+
PEI+PEk+PEZPTlQgY29sb3I9IzAwMDAwMCBzaXplPTY+V2UgaGF2ZSBwcm9ncmFtcyBmb3Ig
DQo8L0ZPTlQ+PEZPTlQgY29sb3I9I2ZmMDAwMCBzaXplPTY+PFU+RVZFUlk8L1U+PC9GT05U
PjxGT05UIGNvbG9yPSMwMDAwMDAgc2l6ZT02PiANCmNyZWRpdCBzaXR1YXRpb24hPC9GT05U
PjxCUj48QlI+PEEgaHJlZj0iaHR0cDovLzIxNi4xMTAuMTc5LjIyIiB0YXJnZXQ9X2JsYW5r
PjxGT05UIA0KY29sb3I9IzAwMDBmZiBzaXplPTU+Q2xpY2sgaGVyZSBmb3IgeW91ciBGUkVF
IFJBVEUgUVVPVEUhPC9GT05UPjwvQT48L0k+PC9CPjwvUD4NCjxQIGFsaWduPWxlZnQ+PEZP
TlQgY29sb3I9IzAwODAwMD48U1RST05HPiZxdW90O1RoaXMgbWVzc2FnZSBpcyBiZWluZyBz
ZW50IHRvDQp5b3UgaW4gY29tcGxpYW5jZSB3aXRoJm5ic3A7QmlsbCBTLiAxNjE4IFRpdGxl
IElJSSBwYXNzZWQgYnkgdGhlIDEwNXRoIFVTDQpDb25ncmVzcywgd2hpY2ggc3RhdGVzIHRo
YXQgdGhpcyBsZXR0ZXIgY2FuIG5vdCBiZSBjb25zaWRlcmVkIHNwYW0gYXMgbG9uZyBhcyB3
ZQ0KaW5jbHVkZSAoMSkgVmFsaWQgQ29udGFjdCBJbmZvcm1hdGlvbiBhbmQgKDIpJm5ic3A7
YSB3YXkgdG8gYmUgcmVtb3ZlZCBmcm9tIGFueQ0KZnVydGhlciB0cmFuc21pc3Npb25zIGF0
IG5vIGNvc3QgdG8geW91IGJ5IHN1Ym1pdHRpbmcgYSByZXF1ZXN0IHRvIGJlDQpyZW1vdmVk
LiZxdW90OyAuIDxhIGhyZWY9Imh0dHA6Ly8yMTYuMTEwLjE3OS4yMi9yZW1vdmUuaHRtIj5D
bGljayBIZXJlIHRvIFNlbmQgYSBSZW1vdmUgUmVxdWVzdDwvYT4uDQomcXVvdDtXZSBob25v
ciBhbGwgcmVtb3ZlIGVtYWlsIGFkZHJlc3MgcmVxdWVzdHMmbmJzcDtpbW1lZGlhdGVseS4m
cXVvdDs8L1NUUk9ORz48L0ZPTlQ+PC9QPjwvQk9EWT48L0hUTUw+
------=_NextPart_000_001__761153522_25132.69--
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 16 14:47:45 2001
Delivered-To: freebsd-security@freebsd.org
Received: from excalibur.skynet.be (excalibur.skynet.be [195.238.3.135])
by hub.freebsd.org (Postfix) with ESMTP id 1724137B417
for ; Sun, 16 Dec 2001 14:47:42 -0800 (PST)
Received: from skynet.be (dialup227.herentals.skynet.be [195.238.28.227])
by excalibur.skynet.be (8.11.6/8.11.6/Skynet-OUT-2.16) with ESMTP id fBGMjT822774;
Sun, 16 Dec 2001 23:45:29 +0100 (MET)
(envelope-from )
Message-ID: <3C1D23FC.2010207@skynet.be>
Date: Sun, 16 Dec 2001 23:45:16 +0100
From: Raf Schietekat
Reply-To: Raf_Schietekat@ieee.org
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:0.9.4) Gecko/20011019 Netscape6/6.2
X-Accept-Language: en-us
MIME-Version: 1.0
To: Matt Piechota
Cc: FreeBSD-security@FreeBSD.ORG
Subject: Re: kdm grants ordinary users root access on 4.4-R
References: <20011215132828.P59641-100000@cithaeron.argolis.org> <3C1BCE3B.4010102@skynet.be>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Raf Schietekat wrote:
> Matt Piechota wrote:
>
>> [...]
>> Strange. My kde2 (or are we talking kde1?) doesn't show this behavior.
That's probably because you configured it correctly. As I have written,
I had used xdm's Xsession for kdm's Xstartup (there was no error message
for Xsession at that point, and xdm didn't have an Xstartup, so I just
guessed... wrong, and it only seemed to work). Now I've moved it back to
Xsession and put some proper echo "#!/bin/sh" contents in Xreset and in
a new Xstartup. After that, the problem disappeared. I have reported
this on bugs.kde.org. Now I have to see about some proper documentation
about this for FreeBSD (if it exists, I missed it).
>
>
>[...]
--
Raf Schietekat
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 16 20: 5:52 2001
Delivered-To: freebsd-security@freebsd.org
Received: from fep05-svc.mail.telepac.pt (fep05-svc.mail.telepac.pt [194.65.5.209])
by hub.freebsd.org (Postfix) with ESMTP
id 1398837B422; Sun, 16 Dec 2001 20:04:24 -0800 (PST)
Received: from user ([213.13.76.47]) by fep05-svc.mail.telepac.pt
(InterMail vM.4.01.02.27 201-229-119-110) with SMTP
id <20011217040742.CPWD8450.fep05-svc.mail.telepac.pt@user>;
Mon, 17 Dec 2001 04:07:42 +0000
From: 1ran5don@o-tay.com
To:
Subject: Seek and Find
Date: Sun, 16 Dec 2001 21:53:15 -0600
X-Priority: 1
X-MSMail-Priority: High
Message-Id: <20011217040742.CPWD8450.fep05-svc.mail.telepac.pt@user>
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
READY TO KNOW?
CONFIDENTIAL!
The SOFTWARE They Want BANNED In all 50 STATES.
Why? Because these secrets were never intended to reach your eyes...
Get the facts on anyone
Locate Missing Persons, find Lost Relatives, obtain Addresses
and Phone Numbers of old school friends, even Skip Trace Dead
Beat Spouses. This is not a Private Investigator, but a
sophisticated SOFTWARE program DESIGNED to automatically
CRACK YOUR CASE with links to thousands of Public Record databases.
Find out SECRETS about your relatives, friends, enemies,
and everyone else! Even your spouse! With the New,
INTERNET SPY AND YOU!
It's absolutely astounding! Here's what you can learn.
License plate number
Get anyone's name and address with just a license plate number
(Find that girl you met in traffic!
Driving record!
Get anyone's driving record!
Social security number!
Trace anyone by social security number!
Address!
Get anyone's address with just a name!
Unlisted phone numbers
Get anyone's phone number with just a
name even unlisted numbers!
Locate!
Long lost friends, relatives, a past lover who broke your heart!
E-mail
Send anonymous e-mail completely untraceable!
Dirty secrets!
Discover dirty secrets your in-laws don't want you to know!
Investigate anyone! Use the sources that private investigators
use (all on the Internet)
secretly!
Ex-spouse!
Learn how to get information on an ex-spouse that will help you
win in court! (Dig up old skeletons)
Criminal search Background check!
Find out about your daughter's boyfriend!
Find out!
If you are being investigated!
Neighbors!
Learn all about your mysterious neighbors! Find out what they
have to hide!
People you work with! Be astonished by what you'll learn
about people you work with!
Education verification!
Did he really graduate college? Find out!
Internet Spy and You!
Software will help you discover ANYTHING about anyone, with
clickable hyperlinks and no typing in Internet addresses! Just
insert the floppy disk and Go!
You will be shocked and amazed by the secrets that can be
discovered about absolutely everyone! Find out the secrets
they don't want you to know! About others, about yourself!
It's INCREDIBLE what you can find out using Internet Spy and You
and the Internet! You'll be riveted to your computer screen!
Get the software they're trying to ban! Before it's too late!
ACT NOW!! ONLY $19.95!!
REGULAR PRICE $24.95
ORDER NOW AND RECEIVE THE SPY SOFTWARE FOR $19.95!
THAT'S RIGHT ONLY $19.95
We will SEND YOU our Internet Spy and You SOFTWARE so you can
begin discovering all the secrets you ever wanted to know!
You can Know EVERYTHING about ANYONE with our Internet Spy and
You Software. Works with all browsers and all versions of AOL!
REGULAR PRICE IS $24.95
ORDER TODAY AND SAVE!! SEND ONLY $19.95
US FUNDS , MONEY ORDER, CASH, CHECK, OR CREDIT CARD
Foreign money orders must be payable on a US BANK AND IN US FUNDS
NO EXCEPTIONS!
DON'T WAIT TO GET STARTED...It's as easy as 1, 2, 3.
STEP 1 - Print the order form text below.
STEP 2 - Type or print your order information
into the order form section.
STEP 3 - Mail order form and payment to the address below.
Send to:
GOODWINN COMMUNICATIONS
390 SOUTH TYNDALL PKWY #108
PARKER, FL 32404
Name: ________________________________________
Address: ________________________________________
City/State/Zip: ______________________________________
FOR MASTER CARD AND VISA CREDIT CARD ORDERS ONLY!
Account Number: ____________________________________
Exp. Date: ________________________
Phone number required______________________________
Signature______________________
DISCLAIMER: The seller of this powerful software resource will not
be held responsible for how the purchaser chooses to use it's resources.
To be removed from our mailing list oscar02b@yahoo.com
and put off in the subject. Thank you
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Sun Dec 16 23:31: 8 2001
Delivered-To: freebsd-security@freebsd.org
Received: from noname.csdl.lt (noname.csdl.lt [194.176.40.182])
by hub.freebsd.org (Postfix) with SMTP id 0C32337B416
for ; Sun, 16 Dec 2001 23:31:05 -0800 (PST)
Received: (qmail 94628 invoked by uid 1000); 17 Dec 2001 07:31:03 -0000
Date: Mon, 17 Dec 2001 09:31:03 +0200
From: Paulius Bulotas
To: freebsd-security@freebsd.org
Subject: options TCP_DROP_SYNFIN
Message-ID: <20011217073102.GA94480@noname>
Mail-Followup-To: freebsd-security@freebsd.org
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
User-Agent: Mutt/1.3.24i
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Hello,
in LINT there is a comment for ^ option:
# TCP_DROP_SYNFIN adds support for ignoring TCP packets with
# SYN+FIN. This prevents nmap et al. from identifying the
# TCP/IP stack, but breaks support for RFC1644 extensions
# and is not recommended for web servers.
So, what's wrong, if it will be included/enabled on web server? I've
read rfc quickly, but haven't found anything that would be useful for
web servers (or that's only intended for future use?) and was really
used at this time widely.
Anyone can explain, why enabling this option is wrong on web server?
Regards,
Paulius
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 0: 5:19 2001
Delivered-To: freebsd-security@freebsd.org
Received: from raven.robbins.dropbear.id.au (069.a.006.mel.iprimus.net.au [210.50.44.69])
by hub.freebsd.org (Postfix) with ESMTP id A8D0937B417
for ; Mon, 17 Dec 2001 00:05:10 -0800 (PST)
Received: (from tim@localhost)
by raven.robbins.dropbear.id.au (8.11.6/8.11.6) id fBH7suf34380
for freebsd-security@FreeBSD.ORG; Mon, 17 Dec 2001 18:54:56 +1100 (EST)
(envelope-from tim)
Date: Mon, 17 Dec 2001 18:54:56 +1100
From: "Tim J. Robbins"
To: freebsd-security@FreeBSD.ORG
Subject: Re: options TCP_DROP_SYNFIN
Message-ID: <20011217185456.A34365@raven.robbins.dropbear.id.au>
References: <20011217073102.GA94480@noname>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <20011217073102.GA94480@noname>; from paulius@kaktusas.org on Mon, Dec 17, 2001 at 09:31:03AM +0200
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 17, 2001 at 09:31:03AM +0200, Paulius Bulotas wrote:
> Anyone can explain, why enabling this option is wrong on web server?
T/TCP (RFC 1644) speeds up transactions by not using the standard three-
way handshake. I gather that it's more efficient if you have lots of
quick connects and disconnects as you do with HTTP when not using the
keepalive features.
Tim
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 0:34:38 2001
Delivered-To: freebsd-security@freebsd.org
Received: from noname.csdl.lt (noname.csdl.lt [194.176.40.182])
by hub.freebsd.org (Postfix) with SMTP id 28F3737B41E
for ; Mon, 17 Dec 2001 00:34:34 -0800 (PST)
Received: (qmail 97178 invoked by uid 1000); 17 Dec 2001 08:34:32 -0000
Date: Mon, 17 Dec 2001 10:34:32 +0200
From: Paulius Bulotas
To: freebsd-security@FreeBSD.ORG
Subject: Re: options TCP_DROP_SYNFIN
Message-ID: <20011217083432.GA96883@noname>
Mail-Followup-To: freebsd-security@FreeBSD.ORG
References: <20011217073102.GA94480@noname> <20011217185456.A34365@raven.robbins.dropbear.id.au>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
In-Reply-To: <20011217185456.A34365@raven.robbins.dropbear.id.au>
User-Agent: Mutt/1.3.24i
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On 01 12 17, Tim J. Robbins wrote:
> > Anyone can explain, why enabling this option is wrong on web server?
> way handshake. I gather that it's more efficient if you have lots of
> quick connects and disconnects as you do with HTTP when not using the
> keepalive features.
Ok, so I should disable keep alive in Apache and enable SYN+FIN (disable
option ;), then I'll get faster connects.?. but how many clients (OSes) use
this rfc? None? or they should be enabled somehow?
Paulius
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 1: 8: 6 2001
Delivered-To: freebsd-security@freebsd.org
Received: from raven.robbins.dropbear.id.au (069.a.006.mel.iprimus.net.au [210.50.44.69])
by hub.freebsd.org (Postfix) with ESMTP id A975237B41A
for ; Mon, 17 Dec 2001 01:07:57 -0800 (PST)
Received: (from tim@localhost)
by raven.robbins.dropbear.id.au (8.11.6/8.11.6) id fBH8s7r34489
for freebsd-security@FreeBSD.ORG; Mon, 17 Dec 2001 19:54:07 +1100 (EST)
(envelope-from tim)
Date: Mon, 17 Dec 2001 19:54:06 +1100
From: "Tim J. Robbins"
To: freebsd-security@FreeBSD.ORG
Subject: Re: options TCP_DROP_SYNFIN
Message-ID: <20011217195406.A34425@raven.robbins.dropbear.id.au>
References: <20011217073102.GA94480@noname> <20011217185456.A34365@raven.robbins.dropbear.id.au> <20011217083432.GA96883@noname>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <20011217083432.GA96883@noname>; from paulius@kaktusas.org on Mon, Dec 17, 2001 at 10:34:32AM +0200
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 17, 2001 at 10:34:32AM +0200, Paulius Bulotas wrote:
> Ok, so I should disable keep alive in Apache and enable SYN+FIN (disable
> option ;), then I'll get faster connects.?. but how many clients (OSes) use
> this rfc? None? or they should be enabled somehow?
There's no point changing these settings from the defaults on a web server.
Leaving HTTP keepalives enabled and T/TCP un-broken should be more efficient
than any other combination. I don't know of any clients other than FreeBSD
that have T/TCP support; to enable it, sysctl -w net.inet.tcp.rfc1644=1 .
Tim
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 4:20:14 2001
Delivered-To: freebsd-security@freebsd.org
Received: from nsvm09.zaq.ne.jp (nsvm09.zaq.ne.jp [211.124.0.170])
by hub.freebsd.org (Postfix) with SMTP id 1622F37B427
for ; Mon, 17 Dec 2001 04:19:06 -0800 (PST)
Received: (qmail 3477 invoked from network); 17 Dec 2001 21:19:01 +0900
Received: from zaqd3875bb3.zaq.ne.jp (HELO mail.njstar.net) (211.135.91.179)
by nsvm09.zaq.ne.jp with SMTP; 17 Dec 2001 21:19:01 +0900
From: "Shannon.G@njstar.com"
To: "8687@hotbot.com" <8687@hotbot.com>
Message-ID: <1008613073.0733327407@mail.njstar.net>
Subject: Conference calls are safe
MIME-Version: 1.0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Mon, 17 Dec 2001 04:19:06 -0800 (PST)
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Take Control Of Your Conference Calls
Long Distance
Conferencing Only 18 Cents Per
Minute |
Connects Up To 100 Participants=21=
B>
No setup fees
No contracts or monthly fees
Call anytime, from anywhere, to anywhere
International Dial In 18 cents per minute
Simplicity in set up and administration
Operator Help available 24/7 |
G=
et the best
quality, the easiest to use, and lowest rate in the
industry. |
If you like saving =
money, fill
out the form below and one of our consultants will contact
you. |
Required Input Field*
This ad is being sent in compliance with Senate Bill 1618=
, Title 3, Section 301.
You have recently visited our web site, referral or affiliate sit=
es which indicated you were
interested in communication services. If this email is reaching =
you in error and you feel that you have not contacted
us, Click
here. We sincerely apologize, and assure you will be r=
emoved from our distribution list.
|
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 5:37:53 2001
Delivered-To: freebsd-security@freebsd.org
Received: from sekurity.net (spider.wildcatblue.com [206.157.147.19])
by hub.freebsd.org (Postfix) with SMTP id AE49737B41E
for ; Mon, 17 Dec 2001 05:37:44 -0800 (PST)
Received: from asgidavid ([208.32.50.91]) by sekurity.net ; Mon, 17 Dec 2001 09:45:14 -3736632
Message-ID: <002a01c186fe$5af22b80$1506810a@asgidavid>
From: "David Rhodus"
To: "David Xu" ,
"Christopher Schulte"
Cc: "Landon Stewart" ,
References: <5.1.0.14.0.20011212004626.03242638@pop.schulte.org> <3C16FF8A.1050001@viasoft.com.cn>
Subject: Re: MD5 sum checking for installed binaries to check for intrusion or root kits...
Date: Mon, 17 Dec 2001 08:25:54 -0500
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2526.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2526.0000
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
# Simple shell script for md5
# Stored format - Filename MD5HASH suidbit/sgidbit
echo "";
errormsg()
{
echo "Incorrect parameters!";
echo "Please use" $0 "create [hashfile] to create/update a table of
checksums or";
echo $0 "check [hashfile] [current] to compare checksums.";
echo "";
exit
}
if [ -z $1 ]; then
errormsg;
elif [ $1 = "create" ]; then
if [ -z $2 ]; then
errormsg;
fi
echo "Creating table of sums...";
find / -name '*' -perm +4000 -o -perm +2000 -type f | xargs md5sum |
awk '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >
.tmp123;
find ~ /bin /sbin /usr/sbin -maxdepth 1 -type f | xargs md5sum | awk
'// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >>
.tmp123;
cat .tmp123 | sort | uniq > $2;
rm .tmp123;
chmod 600 $2;
echo "";
echo "Finished compiling list.";
echo "Hashed a total of"`cat $2 | wc --lines` "files!";
elif [ $1 = "check" ]; then
if [ -z $2 ]; then
errormsg;
fi
echo "Building current settings..."
find / -name '*' -perm +4000 -o -perm +2000 -type f | xargs md5sum |
awk '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >
.tmp123;
find ~ /bin /sbin /usr/sbin -maxdepth 1 -type f | xargs md5sum | awk
'// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >>
.tmp123;
cat .tmp123 | sort | uniq > .tmpf;
rm .tmp123;
echo "Comparing settings..."
echo "*-- Checksum report --*" > .errreport;
if [ `cat .tmpf | wc -l` -ne `cat $2 | wc -l` ]; then
echo "Number of files do not match!" | tee --append
.errreport;
fi
if [ `cat .tmpf | awk '// {print $3}' | egrep "s|S" | wc -l` -ne
`cat $2 | awk '// {print $3}' | egrep "s|S" | wc -l` ]; then
echo "Number of suid/sgid files do not match!" | tee --a
.errreport;
fi
# temp=`diff .tmpf $2`;
if (diff .tmpf $2 > /dev/null) then
echo "No differences found!";
rm .tmpf .errreport;
exit;
fi;
echo "Differences encountered! Outputting to stdout and mailing
user...";
echo "" | tee -a .errreport;
diff .tmpf $2 | tee -a .errreport;
mail `whoami`@`hostname` < .errreport;
rm .tmpf .errreport;
elif [ -n $1 ]; then
errormsg;
fi;
----- Original Message -----
From: "David Xu"
To: "Christopher Schulte"
Cc: "Landon Stewart" ;
Sent: Wednesday, December 12, 2001 1:56 AM
Subject: Re: MD5 sum checking for installed binaries to check for intrusion
or root kits...
> Could we add a 'sockstat -l' command to /etc/security to check
> listening port,
> this can prevent some backdoor from be installed.
> --
> David Xu
>
> Christopher Schulte wrote:
>
> > At 10:39 PM 12/11/2001 -0800, Landon Stewart wrote:
> >
> >> They could have done who knows what to whatever system(s) they wanted
> >> to. Without someone saying "reformat the machines or reinstall"
> >> because thats the obvious answer, is there a way to check which files
> >> differ from the size they should be and have the correct MD5 sum than
> >> they should or is this asking too much?
> >
> >
> > With no point of reference on 'good state', there's not a lot that can
> > be done. Your previous admins may have legitimately patched things,
> > installed non-standard binaries, or otherwise altered the system from
> > what you'd be able to use as a reference.
> >
> > Even if you could match md5sums, there's many other ways by which a
> > person could install a back door. For example, something as simple as
> > an entry in inetd.conf which serves a root shell upon tcp port
> > connection would not show up in a binary-only md5 scan.
> >
> > Install tripwire (or some custom checksum monitoring system) from the
> > beginning of the OS install for best results. I know, not too much
> > help now. :-(
> >
> > --
> > Christopher Schulte
> > christopher@schulte.org
> > http://noc.schulte.org/
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> >
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 7:11:52 2001
Delivered-To: freebsd-security@freebsd.org
Received: from new-dns.whc.net (new-dns.whc.net [204.90.111.214])
by hub.freebsd.org (Postfix) with ESMTP id 9DEE437B617
for ; Mon, 17 Dec 2001 07:11:42 -0800 (PST)
Received: (from root@localhost)
by new-dns.whc.net (8.11.4/8.11.4/kbp)
id for security@freebsd.org;
Mon, 17 Dec 2001 08:10:03 -0700 (MST)
Received: from null ([66.85.10.234])
by smtp.whc.net (8.11.4/8.11.4/kbpav) with SMTP
id for ;
Mon, 17 Dec 2001 08:09:42 -0700 (MST)
Reply-To:
From: "Carlos Andrade"
To:
Subject: RE: okay now I am worried
Date: Mon, 17 Dec 2001 08:08:11 -0700
Message-ID: <000301c1870c$a535ac40$fa01a8c0@rjstech.com>
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook CWS, Build 9.0.2416 (9.0.2911.0)
In-Reply-To:
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4522.1200
X-Virus-Scanned: by AMaViS perl-11
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Thanks for all the info...
No MTA on the machine in question, sendmail is turned off in rc.conf; so er
right I am um
have no clue what to do next. Inetd is also turned off, which then leads me
to the idea that I have some bad binary or ????. I guess re-installing 4.2
(or going to 4.4 finally) fresh would more than likely "fix" this confusion
but possibly add a whole new level of pain and or suffering.
Thanks for all the ideas,
Carlos Andrade
----
Carlos A. Andrade
IS Manager
RJS Technologies
915.845.5228 ext 13 915.845.2119 fax
carlos@rjstech.com
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 9:10:22 2001
Delivered-To: freebsd-security@freebsd.org
Received: from enigma.whacky.net (enigma.whacky.net [194.109.204.120])
by hub.freebsd.org (Postfix) with ESMTP id 48C5F37B41A
for ; Mon, 17 Dec 2001 09:10:15 -0800 (PST)
Received: from localhost (localhost [127.0.0.1])
by enigma.whacky.net (Postfix) with ESMTP id 3B6BB210F0
for ; Mon, 17 Dec 2001 18:10:12 +0100 (CET)
Received: by enigma.whacky.net (Postfix, from userid 1009)
id D24F72153F; Mon, 17 Dec 2001 18:10:09 +0100 (CET)
Date: Mon, 17 Dec 2001 18:10:09 +0100
From: Marco Walraven
To: freebsd-security@freebsd.org
Subject: isakmpd & ssh sentinel
Message-ID: <20011217181009.A62958@enigma.whacky.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Hi,
I'm trying to setup a VPN connection between isakmpd and a few road warriors
who run ssh sentinel. I installed isamkpd and tried some of the configuration
files. Everytime I start isakmpd with 'isakmpd -d -DA=99' i get these
messages(see below). It also chokes up the CPU. Furthermore, if I try
to connect from a ssh sentinel client, it does not accept a connection
which should be normal if this was indeed an error (which I think it is).
The kernel I use has, IPSEC compiled in it and the system also forwards
packets, which are needed to run isakmpd.
However, does anyone recognize these problems or know how to fix ehm and
has anyone successfully established a VPN(with pre shared keys) between isakmpd
and ssh sentinel ? I know there are some issues between the two, but is
it possible in the first place, or should someone try racoon instead ?.
Regards,
Marco Walraven
isakmpd -d -DA=99
175249.982251 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
175249.982395 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
175249.982483 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
175249.982570 Trpt 70 transport_add: adding 0x8076080
175249.988149 Trpt 90 transport_reference: transport 0x8076080 now has 1 references
175249.988206 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
175250.015566 Trpt 90 transport_reference: transport 0x8076080 now has 2 references
175250.016079 Trpt 90 transport_release: transport 0x8076080 had 2 references
175250.016420 Trpt 90 transport_reference: transport 0x8076080 now has 2 referen
ces
Which keeps on going.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 9:15:35 2001
Delivered-To: freebsd-security@freebsd.org
Received: from hale.inty.net (hale.inty.net [195.92.21.144])
by hub.freebsd.org (Postfix) with ESMTP id 118B537B419
for ; Mon, 17 Dec 2001 09:15:30 -0800 (PST)
Received: from inty.hq.inty.net (inty.hq.inty.net [213.38.150.150])
by hale.inty.net (8.11.3/8.11.3) with ESMTP id fBHHFJ428466;
Mon, 17 Dec 2001 17:15:19 GMT
Received: from tariq ([10.0.1.156])
by inty.hq.inty.net (8.12.1/8.9.3) with SMTP id fBHHFIgD012078;
Mon, 17 Dec 2001 17:15:18 GMT
From: "Tariq Rashid"
To: "Marco Walraven" ,
Subject: RE: isakmpd & ssh sentinel
Date: Mon, 17 Dec 2001 17:18:34 -0000
Message-ID:
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
In-Reply-To: <20011217181009.A62958@enigma.whacky.net>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
X-suppress-rcpt-virus-notify: yes
X-Skip-Virus-Check: yes
X-Virus-Checked: 53782
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
get the latest isakmpd to fix the cup problem.
in fact the nice people at openbsd have made the latest isakmpd sources
compile with no extra patches reqd for freebsd.
how are you using sentinel? in aggressive mode? with identification by ip
address or ufqd or certs?
tariq
-----Original Message-----
From: owner-freebsd-security@FreeBSD.ORG
[mailto:owner-freebsd-security@FreeBSD.ORG]On Behalf Of Marco Walraven
Sent: 17 December 2001 17:10
To: freebsd-security@freebsd.org
Subject: isakmpd & ssh sentinel
Hi,
I'm trying to setup a VPN connection between isakmpd and a few road warriors
who run ssh sentinel. I installed isamkpd and tried some of the
configuration
files. Everytime I start isakmpd with 'isakmpd -d -DA=99' i get these
messages(see below). It also chokes up the CPU. Furthermore, if I try
to connect from a ssh sentinel client, it does not accept a connection
which should be normal if this was indeed an error (which I think it is).
The kernel I use has, IPSEC compiled in it and the system also forwards
packets, which are needed to run isakmpd.
However, does anyone recognize these problems or know how to fix ehm and
has anyone successfully established a VPN(with pre shared keys) between
isakmpd
and ssh sentinel ? I know there are some issues between the two, but is
it possible in the first place, or should someone try racoon instead ?.
Regards,
Marco Walraven
isakmpd -d -DA=99
175249.982251 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
175249.982395 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
175249.982483 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
175249.982570 Trpt 70 transport_add: adding 0x8076080
175249.988149 Trpt 90 transport_reference: transport 0x8076080 now has 1
references
175249.988206 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
175250.015566 Trpt 90 transport_reference: transport 0x8076080 now has 2
references
175250.016079 Trpt 90 transport_release: transport 0x8076080 had 2
references
175250.016420 Trpt 90 transport_reference: transport 0x8076080 now has 2
referen
ces
Which keeps on going.
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
intY has automatically scanned this email with Sophos Anti-Virus
(www.inty.net)
intY has automatically scanned this email with Sophos Anti-Virus (www.inty.net)
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 9:37:32 2001
Delivered-To: freebsd-security@freebsd.org
Received: from enigma.whacky.net (enigma.whacky.net [194.109.204.120])
by hub.freebsd.org (Postfix) with ESMTP id B675037B405
for ; Mon, 17 Dec 2001 09:37:06 -0800 (PST)
Received: from localhost (localhost [127.0.0.1])
by enigma.whacky.net (Postfix) with ESMTP
id 70A8A21538; Mon, 17 Dec 2001 18:37:04 +0100 (CET)
Received: by enigma.whacky.net (Postfix, from userid 1009)
id 4043821544; Mon, 17 Dec 2001 18:37:02 +0100 (CET)
Date: Mon, 17 Dec 2001 18:37:02 +0100
From: Marco Walraven
To: Tariq Rashid
Cc: freebsd-security@freebsd.org
Subject: Re: isakmpd & ssh sentinel
Message-ID: <20011217183701.B62958@enigma.whacky.net>
References: <20011217181009.A62958@enigma.whacky.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: ; from tariq@inty.net on Mon, Dec 17, 2001 at 05:18:34PM -0000
Organization: FearLabs | Unix Consultancy
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 17, 2001 at 05:18:34PM -0000, Tariq Rashid wrote:
>
> get the latest isakmpd to fix the cup problem.
> in fact the nice people at openbsd have made the latest isakmpd sources
> compile with no extra patches reqd for freebsd.
Hey great, i'll try that.
> how are you using sentinel? in aggressive mode? with identification by ip
> address or ufqd or certs?
In aggressive mode, 3DES, with pre shared authentication key. sentinel
run's on laptops which connect to the internet from different locations.
Are certs possible ? I read that there were some issues in the way sentinel
handles x.509v3 certs and it's CN. ?
Marco
> tariq
>
> -----Original Message-----
> From: owner-freebsd-security@FreeBSD.ORG
> [mailto:owner-freebsd-security@FreeBSD.ORG]On Behalf Of Marco Walraven
> Sent: 17 December 2001 17:10
> To: freebsd-security@freebsd.org
> Subject: isakmpd & ssh sentinel
>
>
> Hi,
>
> I'm trying to setup a VPN connection between isakmpd and a few road warriors
> who run ssh sentinel. I installed isamkpd and tried some of the
> configuration
> files. Everytime I start isakmpd with 'isakmpd -d -DA=99' i get these
> messages(see below). It also chokes up the CPU. Furthermore, if I try
> to connect from a ssh sentinel client, it does not accept a connection
> which should be normal if this was indeed an error (which I think it is).
>
> The kernel I use has, IPSEC compiled in it and the system also forwards
> packets, which are needed to run isakmpd.
>
> However, does anyone recognize these problems or know how to fix ehm and
> has anyone successfully established a VPN(with pre shared keys) between
> isakmpd
> and ssh sentinel ? I know there are some issues between the two, but is
> it possible in the first place, or should someone try racoon instead ?.
>
> Regards,
>
> Marco Walraven
>
>
> isakmpd -d -DA=99
>
> 175249.982251 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> 175249.982395 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> 175249.982483 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> 175249.982570 Trpt 70 transport_add: adding 0x8076080
> 175249.988149 Trpt 90 transport_reference: transport 0x8076080 now has 1
> references
> 175249.988206 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> 175250.015566 Trpt 90 transport_reference: transport 0x8076080 now has 2
> references
> 175250.016079 Trpt 90 transport_release: transport 0x8076080 had 2
> references
> 175250.016420 Trpt 90 transport_reference: transport 0x8076080 now has 2
> referen
> ces
>
> Which keeps on going.
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
> intY has automatically scanned this email with Sophos Anti-Virus
> (www.inty.net)
>
>
>
> intY has automatically scanned this email with Sophos Anti-Virus (www.inty.net)
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
--
| FearLabs | Unix Consultancy | info@fearlabs.com
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 10: 3:59 2001
Delivered-To: freebsd-security@freebsd.org
Received: from khavrinen.lcs.mit.edu (khavrinen.lcs.mit.edu [18.24.4.193])
by hub.freebsd.org (Postfix) with ESMTP id 8A47E37B417
for ; Mon, 17 Dec 2001 10:03:57 -0800 (PST)
Received: (from wollman@localhost)
by khavrinen.lcs.mit.edu (8.11.4/8.11.4) id fBHI3kA35513;
Mon, 17 Dec 2001 13:03:46 -0500 (EST)
(envelope-from wollman)
Date: Mon, 17 Dec 2001 13:03:46 -0500 (EST)
From: Garrett Wollman
Message-Id: <200112171803.fBHI3kA35513@khavrinen.lcs.mit.edu>
To: "Tim J. Robbins"
Cc: freebsd-security@FreeBSD.ORG
Subject: Re: options TCP_DROP_SYNFIN
In-Reply-To: <20011217185456.A34365@raven.robbins.dropbear.id.au>
References: <20011217073102.GA94480@noname>
<20011217185456.A34365@raven.robbins.dropbear.id.au>
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
< said:
> T/TCP (RFC 1644) speeds up transactions by not using the standard three-
> way handshake. I gather that it's more efficient if you have lots of
> quick connects and disconnects as you do with HTTP when not using the
> keepalive features.
However, it's almost entirely irrelevant to this discussion, since the
only Web client which ever used T/TCP was FreeBSD 3.0's `fetch'
program. Transaction TCP turned out to be a bad idea, for a few
fundamental reasons, but might make a comeback some day in a world
with stronger security for TCP connections (e.g., host identity
payload). DES and I have discussed a more appropriate behavior for
this option which does not violate the TCP standard.
-GAWollman
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 10:19:43 2001
Delivered-To: freebsd-security@freebsd.org
Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21])
by hub.freebsd.org (Postfix) with ESMTP
id 02D3C37B41B; Mon, 17 Dec 2001 10:19:14 -0800 (PST)
Received: (from nectar@localhost)
by freefall.freebsd.org (8.11.6/8.11.6) id fBHIJEt62775;
Mon, 17 Dec 2001 10:19:14 -0800 (PST)
(envelope-from security-advisories@freebsd.org)
Date: Mon, 17 Dec 2001 10:19:14 -0800 (PST)
Message-Id: <200112171819.fBHIJEt62775@freefall.freebsd.org>
X-Authentication-Warning: freefall.freebsd.org: nectar set sender to security-advisories@freebsd.org using -f
From: FreeBSD Security Advisories
To: FreeBSD Security Advisories
Subject: FreeBSD Ports Security Advisory FreeBSD-SA-01:67.htdig
Reply-To: security-advisories@freebsd.org
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-01:67 Security Advisory
FreeBSD, Inc.
Topic: htdig configuration file vulnerability
Category: ports
Module: htdig
Announced: 2001-12-17
Credits: Rafal Wojtczuk
Affects: Ports collection prior to the correction date
Corrected: 2001-09-25 07:08:47 2001 UTC
FreeBSD only: NO
I. Background
htsearch is a part of htdig. The htdig system is a complete World Wide
Web indexing and searching system.
II. Problem Description
htsearch can be run either remotely as a CGI or from the command line.
htsearch supports several options for use from the command line, such
as an option specifying a configuration file that it should use.
However, these options are not limited to use via the command line.
When run as a CGI script, htsearch still honors these options, which
may be passed as part of the URL. As a result, a remote attacker can
request that htsearch use any file that the webserver has sufficient
privilege to read as a configuration file.
The htsearch port is not installed by default, nor is it "part of
FreeBSD" as such: it is part of the FreeBSD ports collection, which
contains over 6000 third-party applications in a ready-to-install
format. The ports collection shipped with FreeBSD 4.4 contains this
problem since it was discovered after the release.
FreeBSD makes no claim about the security of these third-party
applications, although an effort is underway to provide a security
audit of the most security-critical ports.
III. Impact
A remote attacker may use htsearch as a kind of denial-of-service
attack by causing it to read a never-ending special file such as
`/dev/null'.
More seriously, if the attacker has a local account or can otherwise
create a file on the target system (such as via anonymous FTP upload
or Samba), then he can remotely read any file on the target system for
which the webserver has sufficient privilege.
IV. Workaround
1) Deinstall the htdig port/package if you have it installed.
V. Solution
1) Upgrade your entire ports collection and rebuild the htdig port.
2) Deinstall the old package and install a new package dated after the
correction date, obtained from the following directories:
[i386]
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/textproc/htdig-3.1.5_1.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/textproc/htdig-3.1.5_1.tgz
[alpha]
Packages are not automatically generated for the alpha architecture at
this time due to lack of build resources.
3) Download a new port skeleton for the htdig port from:
http://www.freebsd.org/ports/
and use it to rebuild the port.
4) Use the portcheckout utility to automate option (3) above. The
portcheckout port is available in /usr/ports/devel/portcheckout or the
package can be obtained from:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz
VI. Correction details
The following list contains the revision numbers of each file that was
corrected in the FreeBSD ports collection.
Path Revision
- -------------------------------------------------------------------------
ports/textproc/htdig/Makefile 1.20
ports/textproc/htdig/file/patch-htsearch_cc 1.1
- -------------------------------------------------------------------------
VII. References
-----BEGIN PGP SIGNATURE-----
Comment: http://www.nectar.cc/pgp
iQCVAwUBPB4x3FUuHi5z0oilAQHsFgP/XYz0xj2mb7RjsKxkrM0Ymtur3CJAWjc/
2lNGjTWMCg46PFX+wlLkd5O37Ryr6wPALamLJu30WmYNgIMPU64vlTrqXVzgPgwv
ZZP3xv8qKTNrZwo40QYxTgeWF2dxIHAztrcD25CEUvrgPTAs0ZjwLKoVxM3sCqyl
Fr2A/AN+JWw=
=oZgk
-----END PGP SIGNATURE-----
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 10:19:50 2001
Delivered-To: freebsd-security@freebsd.org
Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21])
by hub.freebsd.org (Postfix) with ESMTP
id 179E237B426; Mon, 17 Dec 2001 10:19:21 -0800 (PST)
Received: (from nectar@localhost)
by freefall.freebsd.org (8.11.6/8.11.6) id fBHIJK862848;
Mon, 17 Dec 2001 10:19:20 -0800 (PST)
(envelope-from security-advisories@freebsd.org)
Date: Mon, 17 Dec 2001 10:19:20 -0800 (PST)
Message-Id: <200112171819.fBHIJK862848@freefall.freebsd.org>
X-Authentication-Warning: freefall.freebsd.org: nectar set sender to security-advisories@freebsd.org using -f
From: FreeBSD Security Advisories
To: FreeBSD Security Advisories
Subject: FreeBSD Ports Security Advisory FreeBSD-SA-01:68.xsane
Reply-To: security-advisories@freebsd.org
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-01:68 Security Advisory
FreeBSD, Inc.
Topic: xsane port uses insecure temporary file handling
Category: ports
Module: xsane
Announced: 2001-12-17
Credits: Tim Waugh , michal@harddata.com
Affects: Ports collection prior to the correction date
Corrected: 2001-12-14 01:58:36 UTC
FreeBSD only: NO
I. Background
The XSane application is a gtk based X11 front-end to the SANE
(Scanner Access Now Easy) library used to interface with scanners.
XSane will acquire images using devices such as scanners and cameras.
II. Problem Description
XSane creates temporary files in /tmp during the process of scanning
images and to communicate with SANE (the back-end application which
actually performs the scans) during image preview and save.
However XSane creates temporary files using mktemp(3), which can be
easily predicted (see the BUGS section of the mktemp(3) man page).
This makes XSane vulnerable to exploit, opening the opportunity for a
user's files to be overwritten through a race condition.
The xsane port is not installed by default, nor is it "part of
FreeBSD" as such: it is part of the FreeBSD ports collection, which
contains over 6000 third-party applications in a ready-to-install
format. The ports collection shipped with FreeBSD 4.4 contains this
problem since it was discovered after the release.
FreeBSD makes no claim about the security of these third-party
applications, although an effort is underway to provide a security
audit of the most security-critical ports.
III. Impact
A local user may be able to cause xsane (run by another user) to
overwrite any file for which the latter user has sufficient privilege.
While it is advisable to run XSane with a non-privileged user account,
many users run it using the root account, increasing the risk.
IV. Workaround
1) Deinstall the xsane port/package if you have it installed.
V. Solution
1) Upgrade your entire ports collection and rebuild the port.
2) Deinstall the old package and install a new package dated after the
correction date, obtained from the following directories:
[i386]
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/graphics/xsane-0.82.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/graphics/xsane-0.82.tgz
[alpha]
Packages are not automatically generated for the alpha architecture at
this time due to lack of build resources.
NOTE: It may be several days before updated packages are available. Be
sure to check the file creation date on the package, because the
version number of the software has not changed.
3) Download a new port skeleton for the xsane port from:
http://www.freebsd.org/ports/
and use it to rebuild the port.
4) Use the portcheckout utility to automate option (3) above. The
portcheckout port is available in /usr/ports/devel/portcheckout or the
package can be obtained from:
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz
ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz
VI. Correction details
The following list contains the revision numbers of each file that was
corrected in the FreeBSD ports collection.
Path Revision
- -------------------------------------------------------------------------
ports/graphics/xsane/Makefile 1.30
ports/graphics/xsane/distinfo 1.20
ports/graphics/xsane/pkg-plist 1.18
- -------------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Comment: http://www.nectar.cc/pgp
iQCVAwUBPB4x0lUuHi5z0oilAQGbNwP+NZpON4EgH8X/5Jzqr9ITnB4R3ljyka52
lf1fuHrVgX1JJAi5SCFcNaJWcLC44Y24+Yzs4b3zsGszMS+dkG8GrkO+wD2nsTjq
KTEGy8o+3Wyon/gcGQkU1AyhLdfticZhVSTubkcfg8AZUvkQV7zPuvLVronOcYGb
QKpTRN0MDJo=
=qr4R
-----END PGP SIGNATURE-----
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 11:38:32 2001
Delivered-To: freebsd-security@freebsd.org
Received: from lily.ezo.net (lily.ezo.net [206.102.130.13])
by hub.freebsd.org (Postfix) with ESMTP id CBCC037B419
for ; Mon, 17 Dec 2001 11:38:21 -0800 (PST)
Received: from savvyd (c3-1a119.neo.rr.com [24.93.230.119])
by lily.ezo.net (8.11.3/8.11.3) with SMTP id fBHJkiN08787;
Mon, 17 Dec 2001 14:46:44 -0500 (EST)
Message-ID: <003d01c18732$9003b080$22b197ce@ezo.net>
From: "Jim Flowers"
To: "David Rhodus"
Cc:
References: <5.1.0.14.0.20011212004626.03242638@pop.schulte.org> <3C16FF8A.1050001@viasoft.com.cn> <002a01c186fe$5af22b80$1506810a@asgidavid>
Subject: Re: MD5 sum checking for installed binaries to check for intrusion or root kits...
Date: Mon, 17 Dec 2001 14:39:35 -0500
Organization: EZNets, Inc.
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
I've been looking for something like this to implement over ipsec and NFS
but am currently choking on the script. I suspect it is because the
`md5sum' xargs utility returns the arguments that the awk program expects
and my attempt to use /sbin/md5 does not.
Can you confirm and will you share md5sum, as well?
Thanks
----- Original Message -----
From: "David Rhodus"
To: "David Xu" ; "Christopher Schulte"
Cc: "Landon Stewart" ;
Sent: Monday, December 17, 2001 8:25 AM
Subject: Re: MD5 sum checking for installed binaries to check for intrusion
or root kits...
> # Simple shell script for md5
> # Stored format - Filename MD5HASH suidbit/sgidbit
>
> echo "";
>
> errormsg()
> {
> echo "Incorrect parameters!";
> echo "Please use" $0 "create [hashfile] to create/update a table
of
> checksums or";
> echo $0 "check [hashfile] [current] to compare checksums.";
> echo "";
> exit
> }
>
> if [ -z $1 ]; then
> errormsg;
>
> elif [ $1 = "create" ]; then
> if [ -z $2 ]; then
> errormsg;
> fi
> echo "Creating table of sums...";
> find / -name '*' -perm +4000 -o -perm +2000 -type f | xargs md5sum
|
> awk '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >
> .tmp123;
> find ~ /bin /sbin /usr/sbin -maxdepth 1 -type f | xargs md5sum |
awk
> '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >>
> .tmp123;
> cat .tmp123 | sort | uniq > $2;
> rm .tmp123;
> chmod 600 $2;
> echo "";
> echo "Finished compiling list.";
> echo "Hashed a total of"`cat $2 | wc --lines` "files!";
>
> elif [ $1 = "check" ]; then
> if [ -z $2 ]; then
> errormsg;
> fi
> echo "Building current settings..."
> find / -name '*' -perm +4000 -o -perm +2000 -type f | xargs md5sum
|
> awk '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >
> .tmp123;
> find ~ /bin /sbin /usr/sbin -maxdepth 1 -type f | xargs md5sum |
awk
> '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >>
> .tmp123;
> cat .tmp123 | sort | uniq > .tmpf;
> rm .tmp123;
> echo "Comparing settings..."
> echo "*-- Checksum report --*" > .errreport;
> if [ `cat .tmpf | wc -l` -ne `cat $2 | wc -l` ]; then
> echo "Number of files do not match!" | tee --append
> .errreport;
> fi
> if [ `cat .tmpf | awk '// {print $3}' | egrep "s|S" | wc -l` -ne
> `cat $2 | awk '// {print $3}' | egrep "s|S" | wc -l` ]; then
> echo "Number of suid/sgid files do not match!" | tee --a
> .errreport;
> fi
> # temp=`diff .tmpf $2`;
> if (diff .tmpf $2 > /dev/null) then
> echo "No differences found!";
> rm .tmpf .errreport;
> exit;
> fi;
> echo "Differences encountered! Outputting to stdout and mailing
> user...";
> echo "" | tee -a .errreport;
> diff .tmpf $2 | tee -a .errreport;
> mail `whoami`@`hostname` < .errreport;
> rm .tmpf .errreport;
>
> elif [ -n $1 ]; then
> errormsg;
> fi;
> ----- Original Message -----
> From: "David Xu"
> To: "Christopher Schulte"
> Cc: "Landon Stewart" ;
> Sent: Wednesday, December 12, 2001 1:56 AM
> Subject: Re: MD5 sum checking for installed binaries to check for
intrusion
> or root kits...
>
>
> > Could we add a 'sockstat -l' command to /etc/security to check
> > listening port,
> > this can prevent some backdoor from be installed.
> > --
> > David Xu
> >
> > Christopher Schulte wrote:
> >
> > > At 10:39 PM 12/11/2001 -0800, Landon Stewart wrote:
> > >
> > >> They could have done who knows what to whatever system(s) they wanted
> > >> to. Without someone saying "reformat the machines or reinstall"
> > >> because thats the obvious answer, is there a way to check which files
> > >> differ from the size they should be and have the correct MD5 sum than
> > >> they should or is this asking too much?
> > >
> > >
> > > With no point of reference on 'good state', there's not a lot that can
> > > be done. Your previous admins may have legitimately patched things,
> > > installed non-standard binaries, or otherwise altered the system from
> > > what you'd be able to use as a reference.
> > >
> > > Even if you could match md5sums, there's many other ways by which a
> > > person could install a back door. For example, something as simple as
> > > an entry in inetd.conf which serves a root shell upon tcp port
> > > connection would not show up in a binary-only md5 scan.
> > >
> > > Install tripwire (or some custom checksum monitoring system) from the
> > > beginning of the OS install for best results. I know, not too much
> > > help now. :-(
> > >
> > > --
> > > Christopher Schulte
> > > christopher@schulte.org
> > > http://noc.schulte.org/
> > >
> > >
> > > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > > with "unsubscribe freebsd-security" in the body of the message
> > >
> >
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 11:48:25 2001
Delivered-To: freebsd-security@freebsd.org
Received: from wrath.cs.utah.edu (wrath.cs.utah.edu [155.99.198.100])
by hub.freebsd.org (Postfix) with ESMTP id 7309B37B417
for ; Mon, 17 Dec 2001 11:48:16 -0800 (PST)
Received: from faith.cs.utah.edu (faith.cs.utah.edu [155.99.198.108])
by wrath.cs.utah.edu (8.11.6/8.11.6) with ESMTP id fBHJmEX03778;
Mon, 17 Dec 2001 12:48:15 -0700 (MST)
From: David G Andersen
Received: (from danderse@localhost)
by faith.cs.utah.edu (8.11.1/8.11.1) id fBHJmEc26259;
Mon, 17 Dec 2001 12:48:14 -0700 (MST)
Message-Id: <200112171948.fBHJmEc26259@faith.cs.utah.edu>
Subject: Re: MD5 sum checking for installed binaries to check for intrusion or root kits...
To: jflowers@ezo.net (Jim Flowers)
Date: Mon, 17 Dec 2001 12:48:14 -0700 (MST)
Cc: sdrhodus@sekurity.net (David Rhodus), security@FreeBSD.ORG
In-Reply-To: <003d01c18732$9003b080$22b197ce@ezo.net> from "Jim Flowers" at Dec 17, 2001 02:39:35 PM
X-Mailer: ELM [version 2.5 PL2]
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
md5sum is simply the linux version of the utility.
Use 'md5 -r' to get output identical to that of md5sum.
-Dave
Lo and behold, Jim Flowers once said:
>
> I've been looking for something like this to implement over ipsec and NFS
> but am currently choking on the script. I suspect it is because the
> `md5sum' xargs utility returns the arguments that the awk program expects
> and my attempt to use /sbin/md5 does not.
>
> Can you confirm and will you share md5sum, as well?
>
> Thanks
>
> ----- Original Message -----
> From: "David Rhodus"
> To: "David Xu" ; "Christopher Schulte"
>
> Cc: "Landon Stewart" ;
> Sent: Monday, December 17, 2001 8:25 AM
> Subject: Re: MD5 sum checking for installed binaries to check for intrusion
> or root kits...
>
>
> > # Simple shell script for md5
> > # Stored format - Filename MD5HASH suidbit/sgidbit
> >
> > echo "";
> >
> > errormsg()
> > {
> > echo "Incorrect parameters!";
> > echo "Please use" $0 "create [hashfile] to create/update a table
> of
> > checksums or";
> > echo $0 "check [hashfile] [current] to compare checksums.";
> > echo "";
> > exit
> > }
> >
> > if [ -z $1 ]; then
> > errormsg;
> >
> > elif [ $1 = "create" ]; then
> > if [ -z $2 ]; then
> > errormsg;
> > fi
> > echo "Creating table of sums...";
> > find / -name '*' -perm +4000 -o -perm +2000 -type f | xargs md5sum
> |
> > awk '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >
> > .tmp123;
> > find ~ /bin /sbin /usr/sbin -maxdepth 1 -type f | xargs md5sum |
> awk
> > '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >>
> > .tmp123;
> > cat .tmp123 | sort | uniq > $2;
> > rm .tmp123;
> > chmod 600 $2;
> > echo "";
> > echo "Finished compiling list.";
> > echo "Hashed a total of"`cat $2 | wc --lines` "files!";
> >
> > elif [ $1 = "check" ]; then
> > if [ -z $2 ]; then
> > errormsg;
> > fi
> > echo "Building current settings..."
> > find / -name '*' -perm +4000 -o -perm +2000 -type f | xargs md5sum
> |
> > awk '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >
> > .tmp123;
> > find ~ /bin /sbin /usr/sbin -maxdepth 1 -type f | xargs md5sum |
> awk
> > '// {printf($2 " " $1 " "); system("ls -la " $2 " | cut -c 4,7")};' >>
> > .tmp123;
> > cat .tmp123 | sort | uniq > .tmpf;
> > rm .tmp123;
> > echo "Comparing settings..."
> > echo "*-- Checksum report --*" > .errreport;
> > if [ `cat .tmpf | wc -l` -ne `cat $2 | wc -l` ]; then
> > echo "Number of files do not match!" | tee --append
> > .errreport;
> > fi
> > if [ `cat .tmpf | awk '// {print $3}' | egrep "s|S" | wc -l` -ne
> > `cat $2 | awk '// {print $3}' | egrep "s|S" | wc -l` ]; then
> > echo "Number of suid/sgid files do not match!" | tee --a
> > .errreport;
> > fi
> > # temp=`diff .tmpf $2`;
> > if (diff .tmpf $2 > /dev/null) then
> > echo "No differences found!";
> > rm .tmpf .errreport;
> > exit;
> > fi;
> > echo "Differences encountered! Outputting to stdout and mailing
> > user...";
> > echo "" | tee -a .errreport;
> > diff .tmpf $2 | tee -a .errreport;
> > mail `whoami`@`hostname` < .errreport;
> > rm .tmpf .errreport;
> >
> > elif [ -n $1 ]; then
> > errormsg;
> > fi;
> > ----- Original Message -----
> > From: "David Xu"
> > To: "Christopher Schulte"
> > Cc: "Landon Stewart" ;
> > Sent: Wednesday, December 12, 2001 1:56 AM
> > Subject: Re: MD5 sum checking for installed binaries to check for
> intrusion
> > or root kits...
> >
> >
> > > Could we add a 'sockstat -l' command to /etc/security to check
> > > listening port,
> > > this can prevent some backdoor from be installed.
> > > --
> > > David Xu
> > >
> > > Christopher Schulte wrote:
> > >
> > > > At 10:39 PM 12/11/2001 -0800, Landon Stewart wrote:
> > > >
> > > >> They could have done who knows what to whatever system(s) they wanted
> > > >> to. Without someone saying "reformat the machines or reinstall"
> > > >> because thats the obvious answer, is there a way to check which files
> > > >> differ from the size they should be and have the correct MD5 sum than
> > > >> they should or is this asking too much?
> > > >
> > > >
> > > > With no point of reference on 'good state', there's not a lot that can
> > > > be done. Your previous admins may have legitimately patched things,
> > > > installed non-standard binaries, or otherwise altered the system from
> > > > what you'd be able to use as a reference.
> > > >
> > > > Even if you could match md5sums, there's many other ways by which a
> > > > person could install a back door. For example, something as simple as
> > > > an entry in inetd.conf which serves a root shell upon tcp port
> > > > connection would not show up in a binary-only md5 scan.
> > > >
> > > > Install tripwire (or some custom checksum monitoring system) from the
> > > > beginning of the OS install for best results. I know, not too much
> > > > help now. :-(
> > > >
> > > > --
> > > > Christopher Schulte
> > > > christopher@schulte.org
> > > > http://noc.schulte.org/
> > > >
> > > >
> > > > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > > > with "unsubscribe freebsd-security" in the body of the message
> > > >
> > >
> > >
> > >
> > > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > > with "unsubscribe freebsd-security" in the body of the message
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> >
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
--
work: dga@lcs.mit.edu me: dga@pobox.com
MIT Laboratory for Computer Science http://www.angio.net/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 15: 4: 6 2001
Delivered-To: freebsd-security@freebsd.org
Received: from tomts20-srv.bellnexxia.net (tomts20.bellnexxia.net [209.226.175.74])
by hub.freebsd.org (Postfix) with ESMTP id 7FE7537B61C
for ; Mon, 17 Dec 2001 15:03:51 -0800 (PST)
Received: from khan.anarcat.dyndns.org ([65.94.189.35])
by tomts20-srv.bellnexxia.net
(InterMail vM.4.01.03.16 201-229-121-116-20010115) with ESMTP
id <20011217230350.QAAK14593.tomts20-srv.bellnexxia.net@khan.anarcat.dyndns.org>
for ; Mon, 17 Dec 2001 18:03:50 -0500
Received: from shall.anarcat.dyndns.org (shall.anarcat.dyndns.org [192.168.0.1])
by khan.anarcat.dyndns.org (Postfix) with ESMTP id E35431A49
for ; Mon, 17 Dec 2001 18:03:44 -0500 (EST)
Received: by shall.anarcat.dyndns.org (Postfix, from userid 1000)
id 2341220ACB; Mon, 17 Dec 2001 18:03:36 -0500 (EST)
Date: Mon, 17 Dec 2001 18:03:36 -0500
From: The Anarcat
To: FreeBSD Security
Subject: Invalid self-signature (was: Re: FreeBSD Ports Security Advisory FreeBSD-SA-01:67.htdig)
Message-ID: <20011217230335.GB658@shall.anarcat.dyndns.org>
References: <200112171819.fBHIJEt62775@freefall.freebsd.org>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature"; boundary="IiVenqGWf+H9Y6IX"
Content-Disposition: inline
In-Reply-To: <200112171819.fBHIJEt62775@freefall.freebsd.org>
User-Agent: Mutt/1.3.24i
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
--IiVenqGWf+H9Y6IX
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Is it me or is there something wrong with the signer keys on the
keyservers?
Mutt tells me this:
[-- PGP output follows (current time: Mon Dec 17 18:01:10 2001) --]
gpg: Warning: using insecure memory!
gpg: Signature made Mon Dec 17 12:56:44 2001 EST using RSA key ID 73D288A5
gpg: requesting key 73D288A5 from horowitz.surfnet.nl ...
gpg: key 73D288A5: invalid self-signature
gpg: key 73D288A5: no valid user IDs
gpg: this may be caused by a missing self-signature
gpg: Total number processed: 1
gpg: w/o user IDs: 1
gpg: Can't check signature: public key not found
[-- End of PGP output --]
thanks..
a.
--IiVenqGWf+H9Y6IX
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org
iEYEARECAAYFAjweecYACgkQttcWHAnWiGfq7ACgj/tKmkCR7M86id72KSRVVqBo
RTcAoJ2f198LWkCbbVxeiefcv5/wCsfQ
=kT1A
-----END PGP SIGNATURE-----
--IiVenqGWf+H9Y6IX--
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 17: 4:56 2001
Delivered-To: freebsd-security@freebsd.org
Received: from scaup.prod.itd.earthlink.net (scaup.mail.pas.earthlink.net [207.217.120.49])
by hub.freebsd.org (Postfix) with ESMTP id AF56537B41A
for ; Mon, 17 Dec 2001 17:04:52 -0800 (PST)
Received: from dialup-209.247.139.120.dial1.sanjose1.level3.net ([209.247.139.120] helo=blossom.cjclark.org)
by scaup.prod.itd.earthlink.net with esmtp (Exim 3.33 #1)
id 16G8gX-0006Pk-00; Mon, 17 Dec 2001 17:04:45 -0800
Received: (from cjc@localhost)
by blossom.cjclark.org (8.11.6/8.11.3) id fBI14cO20740;
Mon, 17 Dec 2001 17:04:38 -0800 (PST)
(envelope-from cjc)
Date: Mon, 17 Dec 2001 17:04:38 -0800
From: "Crist J . Clark"
To: David Rhodus
Cc: David Xu ,
Christopher Schulte ,
Landon Stewart , security@FreeBSD.ORG
Subject: Re: MD5 sum checking for installed binaries to check for intrusion or root kits...
Message-ID: <20011217170438.D19170@blossom.cjclark.org>
References: <5.1.0.14.0.20011212004626.03242638@pop.schulte.org> <3C16FF8A.1050001@viasoft.com.cn> <002a01c186fe$5af22b80$1506810a@asgidavid>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <002a01c186fe$5af22b80$1506810a@asgidavid>; from sdrhodus@sekurity.net on Mon, Dec 17, 2001 at 08:25:54AM -0500
X-URL: http://people.freebsd.org/~cjc/
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 17, 2001 at 08:25:54AM -0500, David Rhodus wrote:
[snip]
mtree(8) has the capability to do a lot of this on its won.
--
"It's always funny until someone gets hurt. Then it's hilarious."
Crist J. Clark | cjclark@alum.mit.edu
| cjclark@jhu.edu
http://people.freebsd.org/~cjc/ | cjc@freebsd.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 17:14:58 2001
Delivered-To: freebsd-security@freebsd.org
Received: from avocet.prod.itd.earthlink.net (avocet.mail.pas.earthlink.net [207.217.120.50])
by hub.freebsd.org (Postfix) with ESMTP id B136D37B405
for ; Mon, 17 Dec 2001 17:14:56 -0800 (PST)
Received: from dialup-209.247.139.120.dial1.sanjose1.level3.net ([209.247.139.120] helo=blossom.cjclark.org)
by avocet.prod.itd.earthlink.net with esmtp (Exim 3.33 #1)
id 16G8qN-0005eS-00; Mon, 17 Dec 2001 17:14:55 -0800
Received: (from cjc@localhost)
by blossom.cjclark.org (8.11.6/8.11.3) id fBI1Erf20837;
Mon, 17 Dec 2001 17:14:53 -0800 (PST)
(envelope-from cjc)
Date: Mon, 17 Dec 2001 17:14:53 -0800
From: "Crist J . Clark"
To: Carlos Andrade
Cc: security@FreeBSD.ORG
Subject: Re: okay now I am worried
Message-ID: <20011217171453.E19170@blossom.cjclark.org>
References: <000301c1870c$a535ac40$fa01a8c0@rjstech.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <000301c1870c$a535ac40$fa01a8c0@rjstech.com>; from carlos@rjstech.com on Mon, Dec 17, 2001 at 08:08:11AM -0700
X-URL: http://people.freebsd.org/~cjc/
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, Dec 17, 2001 at 08:08:11AM -0700, Carlos Andrade wrote:
> Thanks for all the info...
> No MTA on the machine in question, sendmail is turned off in rc.conf; so er
> right I am um
> have no clue what to do next. Inetd is also turned off, which then leads me
> to the idea that I have some bad binary or ????. I guess re-installing 4.2
> (or going to 4.4 finally) fresh would more than likely "fix" this confusion
> but possibly add a whole new level of pain and or suffering.
Does any mail get _delivered_ on this machine? That is, does anyone's
mailspool in /var/mail ever get appended to? If so, this is
expected. It has nothing to do with running sendmail(8) or another
MTA. It has nothing to do with inetd(8). It is not a bug. I am not
sure what you are trying to "fix." If you really will feel better
without seeing those in your logs, comment out the 'biff' line from
/etc/services (see mail.local(8)).
--
"It's always funny until someone gets hurt. Then it's hilarious."
Crist J. Clark | cjclark@alum.mit.edu
| cjclark@jhu.edu
http://people.freebsd.org/~cjc/ | cjc@freebsd.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 17:43:25 2001
Delivered-To: freebsd-security@freebsd.org
Received: from scaup.prod.itd.earthlink.net (scaup.mail.pas.earthlink.net [207.217.120.49])
by hub.freebsd.org (Postfix) with ESMTP id B1AA237B405
for ; Mon, 17 Dec 2001 17:43:18 -0800 (PST)
Received: from dialup-209.247.139.120.dial1.sanjose1.level3.net ([209.247.139.120] helo=blossom.cjclark.org)
by scaup.prod.itd.earthlink.net with esmtp (Exim 3.33 #1)
id 16G9Ho-0003Dm-00; Mon, 17 Dec 2001 17:43:16 -0800
Received: (from cjc@localhost)
by blossom.cjclark.org (8.11.6/8.11.3) id fBI1hEB20964;
Mon, 17 Dec 2001 17:43:14 -0800 (PST)
(envelope-from cjc)
Date: Mon, 17 Dec 2001 17:43:14 -0800
From: "Crist J . Clark"
To: endrju
Cc: freebsd-security@FreeBSD.ORG
Subject: Re: ipfw+syn
Message-ID: <20011217174314.G19170@blossom.cjclark.org>
References: <005d01c183f8$2932aec0$8241949f@TRDC> <20011213130508.A20968@mail.slc.edu> <20011213131120.A21111@mail.slc.edu> <016001c18402$bd795110$8241949f@TRDC> <001601c18403$373ff030$5e3bad86@boredom> <005d01c184a4$a6aeefb0$8241949f@TRDC> <20011214144153.A3473@blossom.cjclark.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <20011214144153.A3473@blossom.cjclark.org>; from cjc@FreeBSD.ORG on Fri, Dec 14, 2001 at 02:41:53PM -0800
X-URL: http://people.freebsd.org/~cjc/
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Fri, Dec 14, 2001 at 02:41:53PM -0800, Crist J . Clark wrote:
> On Fri, Dec 14, 2001 at 03:38:44PM +0200, endrju wrote:
> > ...# ipfw -a list
> > 00100 0 0 allow ip from any to any frag
> > 00200 419 44610 allow ip from any to any
> > 65535 884 92423 deny ip from any to any
> >
> > but anyway:
> >
> > su-2.04# nmap -sS -f aaa.bbb.ccc.ddd
> > Starting nmap V. 2.53 by fyodor@insecure.org (www.insecure.org/nmap/ )
> > sendto in send_syn_fragz: Permission denied
>
> It's clear that ipfw(8) is blocking these. Your command line will work
> fine on a FreeBSD machine without ipfw(8) running. I'll see if I can
> figure out exactly where it is dropping these.
The problem here is that ipfw(8) will treat these packets as
"bogusfrags." One of the first things that the firewall does is try to
pullup the packet's IP and TCP header. The IP fragments that nmap(1)
produces with the -f option do not contain the full TCP header in the
initial packet. This causes the pullup to fail.
Dropping packets like this is desired and valid. There is really no
use for them, but trying to evade firewalls. I can't think of a
legitimate reason for their existence. I believe the bug is that this
behavior is not documented or logged. ipfw(8) talks about rule -1 and
what happens to packets with a offset of 1. These packets have an
offset of 2, but are dropped for similar reasons. The logging needs to
be fixed for these.
--
"It's always funny until someone gets hurt. Then it's hilarious."
Crist J. Clark | cjclark@alum.mit.edu
| cjclark@jhu.edu
http://people.freebsd.org/~cjc/ | cjc@freebsd.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 20:52:54 2001
Delivered-To: freebsd-security@freebsd.org
Received: from warez.scriptkiddie.org (uswest-dsl-142-38.cortland.com [209.162.142.38])
by hub.freebsd.org (Postfix) with ESMTP id 23B3C37B405
for ; Mon, 17 Dec 2001 20:52:51 -0800 (PST)
Received: from [192.168.69.11] (unknown [192.168.69.11])
by warez.scriptkiddie.org (Postfix) with ESMTP
id BBD3D62D01; Mon, 17 Dec 2001 20:52:45 -0800 (PST)
Date: Mon, 17 Dec 2001 20:53:21 -0800 (PST)
From: Lamont Granquist
To: Garrett Wollman
Cc: "Tim J. Robbins" ,
Subject: Re: options TCP_DROP_SYNFIN
In-Reply-To: <200112171803.fBHI3kA35513@khavrinen.lcs.mit.edu>
Message-ID: <20011217203955.K4651-100000@coredump.scriptkiddie.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
On Mon, 17 Dec 2001, Garrett Wollman wrote:
> > T/TCP (RFC 1644) speeds up transactions by not using the standard three-
> > way handshake. I gather that it's more efficient if you have lots of
> > quick connects and disconnects as you do with HTTP when not using the
> > keepalive features.
>
> However, it's almost entirely irrelevant to this discussion, since the
> only Web client which ever used T/TCP was FreeBSD 3.0's `fetch'
> program. Transaction TCP turned out to be a bad idea, for a few
> fundamental reasons, but might make a comeback some day in a world
> with stronger security for TCP connections (e.g., host identity
> payload). DES and I have discussed a more appropriate behavior for
> this option which does not violate the TCP standard.
What about using T/TCP for back-end data center traffic? Put it into an
environment where you basically trust your host identities?
(of course most of the time in this kind of environment you can just use a
persistant TCP connection...)
Anyway, more to the point of the original poster, if you're turning on
TCP_DROP_SYNFIN in order to block nmap host identification, you really
have too much free time on your hands. Most attackers are driven not by
which hosts they want to exploit but which exploits they have to use.
They tend to scan large blocks of addresses with automated attack tools
which don't bother to do any osdetection and just look for the service,
attempt to exploit it and return if the exploit was successful or not.
And if you're threat model includes people who are going to target you
specifically and who are very skilled then you have to include the
possibility that they'll know enough to do host identification even in the
presence of TCP_DROP_SYNFIN. Hence, for either threat model (scriptkiddie
or determined attacker) you gain nothing from this option while you break
your RFC compliance.
(and i'm not religiously against security-through-obscurity, i just think
that this isn't a good application of it)
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Mon Dec 17 21:50:24 2001
Delivered-To: freebsd-security@freebsd.org
Received: from citusc17.usc.edu (citusc17.usc.edu [128.125.38.177])
by hub.freebsd.org (Postfix) with ESMTP id 8AB2237B41B
for ; Mon, 17 Dec 2001 21:50:21 -0800 (PST)
Received: (from kris@localhost)
by citusc17.usc.edu (8.11.6/8.11.4) id fBI5oFV80776;
Mon, 17 Dec 2001 21:50:15 -0800 (PST)
(envelope-from kris)
Date: Mon, 17 Dec 2001 21:50:14 -0800
From: Kris Kennaway
To: The Anarcat
Cc: FreeBSD Security
Subject: Re: Invalid self-signature (was: Re: FreeBSD Ports Security Advisory FreeBSD-SA-01:67.htdig)
Message-ID: <20011217215014.A80723@citusc17.usc.edu>
References: <200112171819.fBHIJEt62775@freefall.freebsd.org> <20011217230335.GB658@shall.anarcat.dyndns.org>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
protocol="application/pgp-signature"; boundary="jI8keyz6grp/JLjh"
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <20011217230335.GB658@shall.anarcat.dyndns.org>; from anarcat@anarcat.dyndns.org on Mon, Dec 17, 2001 at 06:03:36PM -0500
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
--jI8keyz6grp/JLjh
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
On Mon, Dec 17, 2001 at 06:03:36PM -0500, The Anarcat wrote:
> Is it me or is there something wrong with the signer keys on the
> keyservers?
Seems like that copy of the key is somehow corrupted. Fetch it from
another keyserver or from the ftp site.
Kris
--jI8keyz6grp/JLjh
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org
iD8DBQE8HtkVWry0BWjoQKURAhoLAKCj4iB+A6BJVzM5+Q0XQublU0mxAACgqA9t
+a+NpLbg/GXDZ8htJN6X1BM=
=FMT3
-----END PGP SIGNATURE-----
--jI8keyz6grp/JLjh--
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 1:34: 5 2001
Delivered-To: freebsd-security@freebsd.org
Received: from jane.inty.net (jane.inty.net [195.224.93.242])
by hub.freebsd.org (Postfix) with ESMTP id 8B1E837B417
for ; Tue, 18 Dec 2001 01:33:49 -0800 (PST)
Received: from inty.hq.inty.net (inty.hq.inty.net [213.38.150.150])
by jane.inty.net (8.11.3/8.11.3) with ESMTP id fBI9XiM65914;
Tue, 18 Dec 2001 09:33:44 GMT
Received: from tariq ([10.0.1.156])
by inty.hq.inty.net (8.12.1/8.9.3) with SMTP id fBI9XdGw036062;
Tue, 18 Dec 2001 09:33:40 GMT
From: "Tariq Rashid"
To: "Marco Walraven"
Cc:
Subject: RE: isakmpd & ssh sentinel
Date: Tue, 18 Dec 2001 09:37:00 -0000
Message-ID:
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
In-Reply-To: <20011217183701.B62958@enigma.whacky.net>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
X-suppress-rcpt-virus-notify: yes
X-Skip-Virus-Check: yes
X-Virus-Checked: 48592
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
add the following to the Makefile...
# following by TR ...
CFLAGS+= -DUSE_ISAKMP_CFG -DUSE_AGGRESSIVE
this sets isakmpd to allow aggressive mode and also to send the config to
the laptops
(like a kind of dhcp where the isakmpd server tells the laptop its ip,
gateway, nameserver, wins server etc...)
... have a look at:
--------------------------------------------------------
# aggressive users ...
[user-b@inty.net]
Phase= 1
Transport= udp
Configuration= Default-aggressive-mode
Authentication= secret-B
Flags= Stayalive
[user-a@inty.net]
Phase= 1
Transport= udp
Configuration= Default-aggressive-mode
Authentication= secret-A
Flags= Stayalive
[user-win2k@inty.net]
Phase= 1
Transport= udp
Configuration= Default-aggressive-mode
Authentication= secret-win2k
Flags= Stayalive
[ufqdn/user-win2k@inty.net]
Address= 10.10.7.33
Netmask= 255.255.0.0
Nameserver= 993.99.99.99
Wins-server= somethineg else...
-------------------------------------------
which i use for pgpnet.... the first two "users" are remote isakmpd gateways
whicvh are on dynamic ips (dialup) ... the last user is a pgpnet laptop user
... pgpnet has an option "acquore virtual identity" which lets it get the
ip,gq,ns and wins ips... there may be something similar for Sentinel.
good luck!
tariq
-----Original Message-----
From: Marco Walraven [mailto:walraven@fearlabs.com]
Sent: 17 December 2001 17:37
To: Tariq Rashid
Cc: freebsd-security@freebsd.org
Subject: Re: isakmpd & ssh sentinel
On Mon, Dec 17, 2001 at 05:18:34PM -0000, Tariq Rashid wrote:
>
> get the latest isakmpd to fix the cup problem.
> in fact the nice people at openbsd have made the latest isakmpd sources
> compile with no extra patches reqd for freebsd.
Hey great, i'll try that.
> how are you using sentinel? in aggressive mode? with identification by ip
> address or ufqd or certs?
In aggressive mode, 3DES, with pre shared authentication key. sentinel
run's on laptops which connect to the internet from different locations.
Are certs possible ? I read that there were some issues in the way sentinel
handles x.509v3 certs and it's CN. ?
Marco
> tariq
>
> -----Original Message-----
> From: owner-freebsd-security@FreeBSD.ORG
> [mailto:owner-freebsd-security@FreeBSD.ORG]On Behalf Of Marco Walraven
> Sent: 17 December 2001 17:10
> To: freebsd-security@freebsd.org
> Subject: isakmpd & ssh sentinel
>
>
> Hi,
>
> I'm trying to setup a VPN connection between isakmpd and a few road
warriors
> who run ssh sentinel. I installed isamkpd and tried some of the
> configuration
> files. Everytime I start isakmpd with 'isakmpd -d -DA=99' i get these
> messages(see below). It also chokes up the CPU. Furthermore, if I try
> to connect from a ssh sentinel client, it does not accept a connection
> which should be normal if this was indeed an error (which I think it is).
>
> The kernel I use has, IPSEC compiled in it and the system also forwards
> packets, which are needed to run isakmpd.
>
> However, does anyone recognize these problems or know how to fix ehm and
> has anyone successfully established a VPN(with pre shared keys) between
> isakmpd
> and ssh sentinel ? I know there are some issues between the two, but is
> it possible in the first place, or should someone try racoon instead ?.
>
> Regards,
>
> Marco Walraven
>
>
> isakmpd -d -DA=99
>
> 175249.982251 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> 175249.982395 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> 175249.982483 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> 175249.982570 Trpt 70 transport_add: adding 0x8076080
> 175249.988149 Trpt 90 transport_reference: transport 0x8076080 now has 1
> references
> 175249.988206 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> 175250.015566 Trpt 90 transport_reference: transport 0x8076080 now has 2
> references
> 175250.016079 Trpt 90 transport_release: transport 0x8076080 had 2
> references
> 175250.016420 Trpt 90 transport_reference: transport 0x8076080 now has 2
> referen
> ces
>
> Which keeps on going.
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
> intY has automatically scanned this email with Sophos Anti-Virus
> (www.inty.net)
>
>
>
> intY has automatically scanned this email with Sophos Anti-Virus
(www.inty.net)
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
--
| FearLabs | Unix Consultancy | info@fearlabs.com
intY has automatically scanned this email with Sophos Anti-Virus
(www.inty.net)
intY has automatically scanned this email with Sophos Anti-Virus (www.inty.net)
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 4: 7:24 2001
Delivered-To: freebsd-security@freebsd.org
Received: from enigma.whacky.net (enigma.whacky.net [194.109.204.120])
by hub.freebsd.org (Postfix) with ESMTP id BFADD37B417
for ; Tue, 18 Dec 2001 04:07:14 -0800 (PST)
Received: from localhost (localhost [127.0.0.1])
by enigma.whacky.net (Postfix) with ESMTP
id AD0C321569; Tue, 18 Dec 2001 13:07:11 +0100 (CET)
Received: by enigma.whacky.net (Postfix, from userid 1009)
id 8271F21599; Tue, 18 Dec 2001 13:07:09 +0100 (CET)
Date: Tue, 18 Dec 2001 13:07:09 +0100
From: Marco Walraven
To: Tariq Rashid
Cc: Marco Walraven ,
freebsd-security@freebsd.org
Subject: Re: isakmpd & ssh sentinel
Message-ID: <20011218130709.A80059@enigma.whacky.net>
References: <20011217183701.B62958@enigma.whacky.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: ; from tariq@inty.net on Tue, Dec 18, 2001 at 09:37:00AM -0000
Organization: FearLabs | Unix Consultancy
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
I downloaded the isakmpd sources from ftp.openbsd.org (/pub/src/sbin/isakmp)
changed the Makefile (OS = freebsd) and added the CFLAGS options.
However, on both FreeBSD 4.3 and 4.4 I get this error message, when
starting my compile with make obj && make depend && make
In file included from /usr/home/marco/test/isakmpd/sysdep/freebsd/sysdep.c:53:
/usr/home/marco/test/isakmpd/pf_key_v2.h:51: syntax error before `u_int8_t'
/usr/home/marco/test/isakmpd/pf_key_v2.h:51: warning: function declaration isn't a prototype
*** Error code 1
Any ideas ?
On Tue, Dec 18, 2001 at 09:37:00AM -0000, Tariq Rashid wrote:
>
>
> add the following to the Makefile...
>
>
> # following by TR ...
> CFLAGS+= -DUSE_ISAKMP_CFG -DUSE_AGGRESSIVE
>
>
> this sets isakmpd to allow aggressive mode and also to send the config to
> the laptops
> (like a kind of dhcp where the isakmpd server tells the laptop its ip,
> gateway, nameserver, wins server etc...)
> ... have a look at:
>
> --------------------------------------------------------
>
> # aggressive users ...
>
> [user-b@inty.net]
> Phase= 1
> Transport= udp
> Configuration= Default-aggressive-mode
> Authentication= secret-B
> Flags= Stayalive
>
> [user-a@inty.net]
> Phase= 1
> Transport= udp
> Configuration= Default-aggressive-mode
> Authentication= secret-A
> Flags= Stayalive
>
> [user-win2k@inty.net]
> Phase= 1
> Transport= udp
> Configuration= Default-aggressive-mode
> Authentication= secret-win2k
> Flags= Stayalive
>
> [ufqdn/user-win2k@inty.net]
> Address= 10.10.7.33
> Netmask= 255.255.0.0
> Nameserver= 993.99.99.99
> Wins-server= somethineg else...
>
>
> -------------------------------------------
>
> which i use for pgpnet.... the first two "users" are remote isakmpd gateways
> whicvh are on dynamic ips (dialup) ... the last user is a pgpnet laptop user
> ... pgpnet has an option "acquore virtual identity" which lets it get the
> ip,gq,ns and wins ips... there may be something similar for Sentinel.
>
> good luck!
>
> tariq
>
> -----Original Message-----
> From: Marco Walraven [mailto:walraven@fearlabs.com]
> Sent: 17 December 2001 17:37
> To: Tariq Rashid
> Cc: freebsd-security@freebsd.org
> Subject: Re: isakmpd & ssh sentinel
>
>
> On Mon, Dec 17, 2001 at 05:18:34PM -0000, Tariq Rashid wrote:
> >
> > get the latest isakmpd to fix the cup problem.
> > in fact the nice people at openbsd have made the latest isakmpd sources
> > compile with no extra patches reqd for freebsd.
>
> Hey great, i'll try that.
>
> > how are you using sentinel? in aggressive mode? with identification by ip
> > address or ufqd or certs?
>
> In aggressive mode, 3DES, with pre shared authentication key. sentinel
> run's on laptops which connect to the internet from different locations.
>
> Are certs possible ? I read that there were some issues in the way sentinel
> handles x.509v3 certs and it's CN. ?
>
> Marco
>
> > tariq
> >
> > -----Original Message-----
> > From: owner-freebsd-security@FreeBSD.ORG
> > [mailto:owner-freebsd-security@FreeBSD.ORG]On Behalf Of Marco Walraven
> > Sent: 17 December 2001 17:10
> > To: freebsd-security@freebsd.org
> > Subject: isakmpd & ssh sentinel
> >
> >
> > Hi,
> >
> > I'm trying to setup a VPN connection between isakmpd and a few road
> warriors
> > who run ssh sentinel. I installed isamkpd and tried some of the
> > configuration
> > files. Everytime I start isakmpd with 'isakmpd -d -DA=99' i get these
> > messages(see below). It also chokes up the CPU. Furthermore, if I try
> > to connect from a ssh sentinel client, it does not accept a connection
> > which should be normal if this was indeed an error (which I think it is).
> >
> > The kernel I use has, IPSEC compiled in it and the system also forwards
> > packets, which are needed to run isakmpd.
> >
> > However, does anyone recognize these problems or know how to fix ehm and
> > has anyone successfully established a VPN(with pre shared keys) between
> > isakmpd
> > and ssh sentinel ? I know there are some issues between the two, but is
> > it possible in the first place, or should someone try racoon instead ?.
> >
> > Regards,
> >
> > Marco Walraven
> >
> >
> > isakmpd -d -DA=99
> >
> > 175249.982251 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> > 175249.982395 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> > 175249.982483 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> > 175249.982570 Trpt 70 transport_add: adding 0x8076080
> > 175249.988149 Trpt 90 transport_reference: transport 0x8076080 now has 1
> > references
> > 175249.988206 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> > 175250.015566 Trpt 90 transport_reference: transport 0x8076080 now has 2
> > references
> > 175250.016079 Trpt 90 transport_release: transport 0x8076080 had 2
> > references
> > 175250.016420 Trpt 90 transport_reference: transport 0x8076080 now has 2
> > referen
> > ces
> >
> > Which keeps on going.
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> >
> > intY has automatically scanned this email with Sophos Anti-Virus
> > (www.inty.net)
> >
> >
> >
> > intY has automatically scanned this email with Sophos Anti-Virus
> (www.inty.net)
> >
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
>
> --
> | FearLabs | Unix Consultancy | info@fearlabs.com
>
> intY has automatically scanned this email with Sophos Anti-Virus
> (www.inty.net)
>
>
>
> intY has automatically scanned this email with Sophos Anti-Virus (www.inty.net)
>
--
| FearLabs | Unix Consultancy | info@fearlabs.com
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 5: 9:22 2001
Delivered-To: freebsd-security@freebsd.org
Received: from hale.inty.net (hale.inty.net [195.92.21.144])
by hub.freebsd.org (Postfix) with ESMTP id 52F2137B41C
for ; Tue, 18 Dec 2001 05:09:08 -0800 (PST)
Received: from inty.hq.inty.net (inty.hq.inty.net [213.38.150.150])
by hale.inty.net (8.11.3/8.11.3) with ESMTP id fBID90m42518;
Tue, 18 Dec 2001 13:09:00 GMT
Received: from tariq ([10.0.1.156])
by inty.hq.inty.net (8.12.1/8.9.3) with SMTP id fBID8xG1033543;
Tue, 18 Dec 2001 13:08:59 GMT
From: "Tariq Rashid"
To: "Marco Walraven"
Cc:
Subject: RE: isakmpd & ssh sentinel
Date: Tue, 18 Dec 2001 13:12:21 -0000
Message-ID:
MIME-Version: 1.0
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
In-Reply-To: <20011218130709.A80059@enigma.whacky.net>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Importance: Normal
X-suppress-rcpt-virus-notify: yes
X-Skip-Virus-Check: yes
X-Virus-Checked: 2858
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
oops - the only other change i made is to add a file (isakmp_cfg.c) to a
source list in the makefile:
you error doesn't seem related though... give this a go and see if that
helps... if not get back to me/us!
------------------------------------------------------
***************
*** 66,72 ****
ike_phase_1.c ike_quick_mode.c init.c ipsec.c ipsec_fld.c \
ipsec_num.c isakmpd.c isakmp_doi.c isakmp_fld.c isakmp_num.c
\
key.c libcrypto.c log.c message.c math_2n.c math_group.c \
! prf.c sa.c sysdep.c timer.c transport.c udp.c ui.c util.c
GENERATED= exchange_num.h ipsec_fld.h ipsec_num.h isakmp_fld.h \
isakmp_num.h
--- 66,72 ----
ike_phase_1.c ike_quick_mode.c init.c ipsec.c ipsec_fld.c \
ipsec_num.c isakmpd.c isakmp_doi.c isakmp_fld.c isakmp_num.c
\
key.c libcrypto.c log.c message.c math_2n.c math_group.c \
! prf.c sa.c sysdep.c timer.c transport.c udp.c ui.c util.c
isakmp_cfg.c
GENERATED= exchange_num.h ipsec_fld.h ipsec_num.h isakmp_fld.h \
isakmp_num.h
***************
-----------------------------------------------------
i also changed my bindir to /usr/local/sbin from /sbin... but that shouldn't
matter
tariq
-----Original Message-----
From: Marco Walraven [mailto:walraven@fearlabs.com]
Sent: 18 December 2001 12:07
To: Tariq Rashid
Cc: Marco Walraven; freebsd-security@freebsd.org
Subject: Re: isakmpd & ssh sentinel
I downloaded the isakmpd sources from ftp.openbsd.org (/pub/src/sbin/isakmp)
changed the Makefile (OS = freebsd) and added the CFLAGS options.
However, on both FreeBSD 4.3 and 4.4 I get this error message, when
starting my compile with make obj && make depend && make
In file included from
/usr/home/marco/test/isakmpd/sysdep/freebsd/sysdep.c:53:
/usr/home/marco/test/isakmpd/pf_key_v2.h:51: syntax error before `u_int8_t'
/usr/home/marco/test/isakmpd/pf_key_v2.h:51: warning: function declaration
isn't a prototype
*** Error code 1
Any ideas ?
On Tue, Dec 18, 2001 at 09:37:00AM -0000, Tariq Rashid wrote:
>
>
> add the following to the Makefile...
>
>
> # following by TR ...
> CFLAGS+= -DUSE_ISAKMP_CFG -DUSE_AGGRESSIVE
>
>
> this sets isakmpd to allow aggressive mode and also to send the config to
> the laptops
> (like a kind of dhcp where the isakmpd server tells the laptop its ip,
> gateway, nameserver, wins server etc...)
> ... have a look at:
>
> --------------------------------------------------------
>
> # aggressive users ...
>
> [user-b@inty.net]
> Phase= 1
> Transport= udp
> Configuration= Default-aggressive-mode
> Authentication= secret-B
> Flags= Stayalive
>
> [user-a@inty.net]
> Phase= 1
> Transport= udp
> Configuration= Default-aggressive-mode
> Authentication= secret-A
> Flags= Stayalive
>
> [user-win2k@inty.net]
> Phase= 1
> Transport= udp
> Configuration= Default-aggressive-mode
> Authentication= secret-win2k
> Flags= Stayalive
>
> [ufqdn/user-win2k@inty.net]
> Address= 10.10.7.33
> Netmask= 255.255.0.0
> Nameserver= 993.99.99.99
> Wins-server= somethineg else...
>
>
> -------------------------------------------
>
> which i use for pgpnet.... the first two "users" are remote isakmpd
gateways
> whicvh are on dynamic ips (dialup) ... the last user is a pgpnet laptop
user
> ... pgpnet has an option "acquore virtual identity" which lets it get the
> ip,gq,ns and wins ips... there may be something similar for Sentinel.
>
> good luck!
>
> tariq
>
> -----Original Message-----
> From: Marco Walraven [mailto:walraven@fearlabs.com]
> Sent: 17 December 2001 17:37
> To: Tariq Rashid
> Cc: freebsd-security@freebsd.org
> Subject: Re: isakmpd & ssh sentinel
>
>
> On Mon, Dec 17, 2001 at 05:18:34PM -0000, Tariq Rashid wrote:
> >
> > get the latest isakmpd to fix the cup problem.
> > in fact the nice people at openbsd have made the latest isakmpd sources
> > compile with no extra patches reqd for freebsd.
>
> Hey great, i'll try that.
>
> > how are you using sentinel? in aggressive mode? with identification by
ip
> > address or ufqd or certs?
>
> In aggressive mode, 3DES, with pre shared authentication key. sentinel
> run's on laptops which connect to the internet from different locations.
>
> Are certs possible ? I read that there were some issues in the way
sentinel
> handles x.509v3 certs and it's CN. ?
>
> Marco
>
> > tariq
> >
> > -----Original Message-----
> > From: owner-freebsd-security@FreeBSD.ORG
> > [mailto:owner-freebsd-security@FreeBSD.ORG]On Behalf Of Marco Walraven
> > Sent: 17 December 2001 17:10
> > To: freebsd-security@freebsd.org
> > Subject: isakmpd & ssh sentinel
> >
> >
> > Hi,
> >
> > I'm trying to setup a VPN connection between isakmpd and a few road
> warriors
> > who run ssh sentinel. I installed isamkpd and tried some of the
> > configuration
> > files. Everytime I start isakmpd with 'isakmpd -d -DA=99' i get these
> > messages(see below). It also chokes up the CPU. Furthermore, if I try
> > to connect from a ssh sentinel client, it does not accept a connection
> > which should be normal if this was indeed an error (which I think it
is).
> >
> > The kernel I use has, IPSEC compiled in it and the system also forwards
> > packets, which are needed to run isakmpd.
> >
> > However, does anyone recognize these problems or know how to fix ehm and
> > has anyone successfully established a VPN(with pre shared keys) between
> > isakmpd
> > and ssh sentinel ? I know there are some issues between the two, but is
> > it possible in the first place, or should someone try racoon instead ?.
> >
> > Regards,
> >
> > Marco Walraven
> >
> >
> > isakmpd -d -DA=99
> >
> > 175249.982251 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> > 175249.982395 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> > 175249.982483 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> > 175249.982570 Trpt 70 transport_add: adding 0x8076080
> > 175249.988149 Trpt 90 transport_reference: transport 0x8076080 now has 1
> > references
> > 175249.988206 Misc 60 conf_get_str: [General]:Listen-on->192.168.2.1
> > 175250.015566 Trpt 90 transport_reference: transport 0x8076080 now has 2
> > references
> > 175250.016079 Trpt 90 transport_release: transport 0x8076080 had 2
> > references
> > 175250.016420 Trpt 90 transport_reference: transport 0x8076080 now has 2
> > referen
> > ces
> >
> > Which keeps on going.
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
> >
> > intY has automatically scanned this email with Sophos Anti-Virus
> > (www.inty.net)
> >
> >
> >
> > intY has automatically scanned this email with Sophos Anti-Virus
> (www.inty.net)
> >
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
>
> --
> | FearLabs | Unix Consultancy | info@fearlabs.com
>
> intY has automatically scanned this email with Sophos Anti-Virus
> (www.inty.net)
>
>
>
> intY has automatically scanned this email with Sophos Anti-Virus
(www.inty.net)
>
--
| FearLabs | Unix Consultancy | info@fearlabs.com
intY has automatically scanned this email with Sophos Anti-Virus
(www.inty.net)
intY has automatically scanned this email with Sophos Anti-Virus (www.inty.net)
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 5:38:51 2001
Delivered-To: freebsd-security@freebsd.org
Received: from stargate.nol.co.za (nol.co.za [196.33.45.2])
by hub.freebsd.org (Postfix) with ESMTP id 91A2037B405
for ; Tue, 18 Dec 2001 05:38:41 -0800 (PST)
Received: from sun.sz.co.za ([196.33.45.209] helo=netgod.nol.co.za)
by stargate.nol.co.za with esmtp (Exim 3.33 #1)
id 16GKVm-0000A5-00
for security@freebsd.org; Tue, 18 Dec 2001 15:42:26 +0200
Message-Id: <5.0.2.1.2.20011218152322.00babb40@nol.co.za>
X-Sender: tim@nol.co.za
X-Mailer: QUALCOMM Windows Eudora Version 5.0.2
Date: Tue, 18 Dec 2001 15:30:51 +0200
To: security@freebsd.org
From: "Timothy S. Bowers"
Subject: kernel security?
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Hi,
I'm running FreeBSD 4.4Stable
Can anyone tell me what is happening to my system ?
The following appears on the console and then the PC reboots. This happens about once a day.
I'd appreciate it if anyone could send me in the right direction.
---------------------------------------------> snip ---------------------
Fatal trap 12: page fault in kernel mode
fault virtual address = 0xc0ba991f
fault code = supervisor write, page not present
instruction pointer = 0x8:0xc017ac83
stack pointer = 0x10:0xd3515e30
frame pointer = 0x10:0xd3515e54
code segment = base 0x0, limit 0xfffff, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags = interrupt enabled, resume, IOPL=0
current process = 588 (httpd)
interrupt mask = net tty
trap number = 12
pannic: page fault
Automatic reboot in 15 seconds.
----------------------------------------> snip ------------------------
Thanks,
Timothy
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 5:54:51 2001
Delivered-To: freebsd-security@freebsd.org
Received: from blackhelicopters.org (geburah.blackhelicopters.org [209.69.178.18])
by hub.freebsd.org (Postfix) with ESMTP id AB8E037B41C
for ; Tue, 18 Dec 2001 05:54:40 -0800 (PST)
Received: (from mwlucas@localhost)
by blackhelicopters.org (8.11.6/8.11.6) id fBIDsNd79983;
Tue, 18 Dec 2001 08:54:23 -0500 (EST)
(envelope-from mwlucas)
Date: Tue, 18 Dec 2001 08:54:23 -0500
From: Michael Lucas
To: "Timothy S. Bowers"
Cc: security@FreeBSD.ORG
Subject: Re: kernel security?
Message-ID: <20011218085423.A79923@blackhelicopters.org>
References: <5.0.2.1.2.20011218152322.00babb40@nol.co.za>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <5.0.2.1.2.20011218152322.00babb40@nol.co.za>; from tim@nol.co.za on Tue, Dec 18, 2001 at 03:30:51PM +0200
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Hello,
This isn't really a security issue; please address future questions to
FreeBSD-questions@FreeBSD.org.
We really cannot tell what's happening from this information. Please
check the Handbook for full details on how to prepare a debugging
crash dump. Get the information, and send it on to FreeBSD-questions.
On Tue, Dec 18, 2001 at 03:30:51PM +0200, Timothy S. Bowers wrote:
> Hi,
>
> I'm running FreeBSD 4.4Stable
> Can anyone tell me what is happening to my system ?
>
> The following appears on the console and then the PC reboots. This happens about once a day.
> I'd appreciate it if anyone could send me in the right direction.
>
> ---------------------------------------------> snip ---------------------
> Fatal trap 12: page fault in kernel mode
> fault virtual address = 0xc0ba991f
> fault code = supervisor write, page not present
> instruction pointer = 0x8:0xc017ac83
> stack pointer = 0x10:0xd3515e30
> frame pointer = 0x10:0xd3515e54
> code segment = base 0x0, limit 0xfffff, type 0x1b
> = DPL 0, pres 1, def32 1, gran 1
> processor eflags = interrupt enabled, resume, IOPL=0
> current process = 588 (httpd)
> interrupt mask = net tty
> trap number = 12
> pannic: page fault
>
> Automatic reboot in 15 seconds.
> ----------------------------------------> snip ------------------------
>
>
> Thanks,
> Timothy
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
--
Michael Lucas mwlucas@FreeBSD.org, mwlucas@BlackHelicopters.org
my FreeBSD column: http://www.oreillynet.com/pub/q/Big_Scary_Daemons
http://www.blackhelicopters.org/~mwlucas/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 8:45:38 2001
Delivered-To: freebsd-security@freebsd.org
Received: from iaces.com (horton.iaces.com [204.147.87.98])
by hub.freebsd.org (Postfix) with ESMTP id 82A0037B419
for ; Tue, 18 Dec 2001 08:45:36 -0800 (PST)
Received: from iaces.com (ptroot.iaces.com [204.147.87.124])
by iaces.com (8.11.6/8.11.6) with ESMTP id fBIGjZJ24474
for ; Tue, 18 Dec 2001 10:45:35 -0600 (CST)
(envelope-from proot@iaces.com)
Message-ID: <3C1F72AE.4A6115C8@iaces.com>
Date: Tue, 18 Dec 2001 10:45:34 -0600
From: Paul Root
X-Mailer: Mozilla 4.79 [en] (Windows NT 5.0; U)
X-Accept-Language: en
MIME-Version: 1.0
To: security@freebsd.org
Subject: multiple pgp secret keys
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
Is it possible to have your own secret key and also
a group secret key in pgp? We're using pgp2. We have
setup a IPv6 support list (ok just an alias) that we want
to be able to sign/encrypt to.
Ideas?
Thanks,
Paul.
--
Paul T. Root E/Mail: proot@iaces.com
600 Stinson Blvd, Fl 1S PAG: +1 (877) 693-7155
Minneapolis, MN 55413 WRK: +1 (612) 664-3385
NIC: PTR FAX: +1 (612) 664-4779
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 9: 2:37 2001
Delivered-To: freebsd-security@freebsd.org
Received: from atkielski.com (atkielski.com [161.58.232.69])
by hub.freebsd.org (Postfix) with ESMTP id 0336137B417
for ; Tue, 18 Dec 2001 09:02:32 -0800 (PST)
Received: from contactdish (ASt-Lambert-101-2-1-14.abo.wanadoo.fr [193.251.59.14]) by atkielski.com (8.11.6) id fBIH2Rp16947; Tue, 18 Dec 2001 18:02:27 +0100 (CET)
Message-ID: <00b701c187e5$c5fbd240$0a00000a@atkielski.com>
From: "Anthony Atkielski"
To: "Paul Root" ,
References: <3C1F72AE.4A6115C8@iaces.com>
Subject: Re: multiple pgp secret keys
Date: Tue, 18 Dec 2001 18:02:23 +0100
MIME-Version: 1.0
Content-Type: text/plain;
charset="Windows-1252"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2600.0000
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
You can have multiple private keys on your private keyring. The keyring is
protected by a single passphrase, however.
----- Original Message -----
From: "Paul Root"
To:
Sent: Tuesday, December 18, 2001 17:45
Subject: multiple pgp secret keys
> Is it possible to have your own secret key and also
> a group secret key in pgp? We're using pgp2. We have
> setup a IPv6 support list (ok just an alias) that we want
> to be able to sign/encrypt to.
>
> Ideas?
>
> Thanks,
> Paul.
>
> --
> Paul T. Root E/Mail: proot@iaces.com
> 600 Stinson Blvd, Fl 1S PAG: +1 (877) 693-7155
> Minneapolis, MN 55413 WRK: +1 (612) 664-3385
> NIC: PTR FAX: +1 (612) 664-4779
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 12:21: 9 2001
Delivered-To: freebsd-security@freebsd.org
Received: from point.osg.gov.bc.ca (point.osg.gov.bc.ca [142.32.102.44])
by hub.freebsd.org (Postfix) with ESMTP
id A0D2437B419; Tue, 18 Dec 2001 12:20:58 -0800 (PST)
Received: (from daemon@localhost)
by point.osg.gov.bc.ca (8.8.7/8.8.8) id MAA06127;
Tue, 18 Dec 2001 12:20:56 -0800
Received: from passer.osg.gov.bc.ca(142.32.110.29)
via SMTP by point.osg.gov.bc.ca, id smtpda06124; Tue Dec 18 12:20:43 2001
Received: (from uucp@localhost)
by passer.osg.gov.bc.ca (8.11.6/8.9.1) id fBIKKOD31470;
Tue, 18 Dec 2001 12:20:24 -0800 (PST)
Received: from UNKNOWN(10.1.2.1), claiming to be "cwsys.cwsent.com"
via SMTP by passer9.cwsent.com, id smtpdD31459; Tue Dec 18 12:19:46 2001
Received: (from uucp@localhost)
by cwsys.cwsent.com (8.11.6/8.9.1) id fBIKJj223508;
Tue, 18 Dec 2001 12:19:45 -0800 (PST)
Message-Id: <200112182019.fBIKJj223508@cwsys.cwsent.com>
Received: from localhost.cwsent.com(127.0.0.1), claiming to be "cwsys"
via SMTP by localhost.cwsent.com, id smtpdB23503; Tue Dec 18 12:19:12 2001
X-Mailer: exmh version 2.5 07/13/2001 with nmh-1.0.4
Reply-To: Cy Schubert - ITSD Open Systems Group
From: Cy Schubert - ITSD Open Systems Group
X-Sender: schubert
To: "Crist J . Clark"
Cc: David Rhodus ,
David Xu ,
Christopher Schulte ,
Landon Stewart , security@FreeBSD.ORG
Subject: Re: MD5 sum checking for installed binaries to check for intrusion or root kits...
In-reply-to: Your message of "Mon, 17 Dec 2001 17:04:38 PST."
<20011217170438.D19170@blossom.cjclark.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Tue, 18 Dec 2001 12:19:12 -0800
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
In message <20011217170438.D19170@blossom.cjclark.org>, "Crist J . Clark" write
s:
> On Mon, Dec 17, 2001 at 08:25:54AM -0500, David Rhodus wrote:
> [snip]
>
> mtree(8) has the capability to do a lot of this on its won.
.. and of course if you want to get fancy, there are the tripwire
and aide ports.
Regards, Phone: (250)387-8437
Cy Schubert Fax: (250)387-5766
Team Leader, Sun/Alpha Team Email: Cy.Schubert@osg.gov.bc.ca
Open Systems Group, ITSD
Ministry of Management Services
Province of BC
FreeBSD UNIX: cy@FreeBSD.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 12:24:21 2001
Delivered-To: freebsd-security@freebsd.org
Received: from www.suntop-cn.com (www.suntop-cn.com [61.140.76.155])
by hub.freebsd.org (Postfix) with ESMTP id 45CD937B419
for ; Tue, 18 Dec 2001 12:24:15 -0800 (PST)
Received: from win ([61.144.141.191])
(authenticated)
by www.suntop-cn.com (8.11.3/8.11.3) with ESMTP id fBIKOBr80876
for ; Wed, 19 Dec 2001 04:24:12 +0800 (CST)
(envelope-from slack@suntop-cn.com)
From: slack@suntop-cn.com
To: freebsd-security@FreeBSD.ORG
Date: Wed, 19 Dec 2001 04:25:22 +0800
MIME-Version: 1.0
Subject: can I use ipfw reassemble fragment packet ?
Message-ID: <3C2016B2.16111.5C1455@localhost>
In-reply-to: <20011217174314.G19170@blossom.cjclark.org>
References: <20011214144153.A3473@blossom.cjclark.org>; from cjc@FreeBSD.ORG on Fri, Dec 14, 2001 at 02:41:53PM -0800
X-mailer: Pegasus Mail for Windows (v4.01)
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Content-description: Mail message body
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
can I use ipfw reassemble fragment packets before let them into intra-net ? I
can't found a way do it .
edwin chen
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 12:43:44 2001
Delivered-To: freebsd-security@freebsd.org
Received: from www.suntop-cn.com (www.suntop-cn.com [61.140.76.155])
by hub.freebsd.org (Postfix) with ESMTP id C5A0237B416
for ; Tue, 18 Dec 2001 12:43:35 -0800 (PST)
Received: from win ([61.144.141.191])
(authenticated)
by www.suntop-cn.com (8.11.3/8.11.3) with ESMTP id fBIKhSr81657
for ; Wed, 19 Dec 2001 04:43:28 +0800 (CST)
(envelope-from slack@suntop-cn.com)
From: slack@suntop-cn.com
To: freebsd-security@FreeBSD.ORG
Date: Wed, 19 Dec 2001 04:44:40 +0800
MIME-Version: 1.0
Subject: about ipfw
Message-ID: <3C201B38.28785.6DBD8F@localhost>
X-mailer: Pegasus Mail for Windows (v4.01)
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Content-description: Mail message body
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
1. can ipfw do a TCP keep-state ?
2. how keep-state combine with "via interface" ?
3. this ipfw rules don't work: why ?
ipfw add pass all any to any via lo
ipfw add pass all any to any via ${iif}
ipfw add divert natd all from any to any via ${oif}
# Allow TCP through if setup succeeded
ipfw add check-state
${fwcmd} add deny tcp from any to any established
# Allow IP fragments to pass through
${fwcmd} add deny all from any to any via ${oif} frag
# Allow icmp 0 3 8 11 pass
${fwcmd} add pass icmp from any to any via ${oif} icmptypes 0,3,8,11
# Reject&Log all setup of incoming connections from the outside
${fwcmd} add deny log tcp from any to any in via ${oif} setup
# Allow setup of any other TCP connection
${fwcmd} add pass tcp from any to any out via ${oif} setup keep-state
# Allow DNS queries out in the world
${fwcmd} add pass udp from ${oip} to any 53 out via ${oif} keep-state
# Allow NTP queries out in the world
${fwcmd} add pass udp from ${oip} to any 123 out via ${oif} keep-state
${fwcmd} add deny log all from any to any
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 16:14:59 2001
Delivered-To: freebsd-security@freebsd.org
Received: from mel-rti20.wanadoo.fr (mel-rti20.wanadoo.fr [193.252.19.91])
by hub.freebsd.org (Postfix) with ESMTP id A5DA937B417
for ; Tue, 18 Dec 2001 16:14:54 -0800 (PST)
Received: from mel-rta10.wanadoo.fr (193.252.19.193) by mel-rti20.wanadoo.fr; 19 Dec 2001 01:14:53 +0100
Received: from html (193.252.190.100) by mel-rta10.wanadoo.fr; 19 Dec 2001 01:14:51 +0100
Message-ID: <3c1fdbfd3c55dbfc@mel-rta10.wanadoo.fr> (added by mel-rta10.wanadoo.fr)
From: bobinsman@msn.com
To: adam@velocity2.com
Subject: The Latest Web Technologies...
Date: Wed, 9 Jan 2002 16:07:58
Mime-Version: 1.0
Content-Type: text/html; charset="DEFAULT"
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
I noticed your email address on a list serve
related to technology and web development. With your permission, we
would like to send you information regarding new web tools and utilities based
on your interests. Please click the
following link and opt-in to our product updates and e-newsletter, click
here
Cordially,
Victor Black
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Tue Dec 18 22: 1:48 2001
Delivered-To: freebsd-security@freebsd.org
Received: from citusc17.usc.edu (citusc17.usc.edu [128.125.38.177])
by hub.freebsd.org (Postfix) with ESMTP id DE51B37B405
for ; Tue, 18 Dec 2001 22:01:44 -0800 (PST)
Received: (from kris@localhost)
by citusc17.usc.edu (8.11.6/8.11.4) id fBJ61R682839;
Tue, 18 Dec 2001 22:01:27 -0800 (PST)
(envelope-from kris)
Date: Tue, 18 Dec 2001 22:01:27 -0800
From: Kris Kennaway
To: slack@suntop-cn.com
Cc: freebsd-security@FreeBSD.ORG
Subject: Re: about ipfw
Message-ID: <20011218220127.A82807@citusc17.usc.edu>
References: <3C201B38.28785.6DBD8F@localhost>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
protocol="application/pgp-signature"; boundary="RnlQjJ0d97Da+TV1"
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <3C201B38.28785.6DBD8F@localhost>; from slack@suntop-cn.com on Wed, Dec 19, 2001 at 04:44:40AM +0800
Sender: owner-freebsd-security@FreeBSD.ORG
Precedence: bulk
List-ID:
List-Archive: (Web Archive)
List-Help: (List Instructions)
List-Subscribe:
List-Unsubscribe:
X-Loop: FreeBSD.org
--RnlQjJ0d97Da+TV1
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
On Wed, Dec 19, 2001 at 04:44:40AM +0800, slack@suntop-cn.com wrote:
> 1. can ipfw do a TCP keep-state ?
> 2. how keep-state combine with "via interface" ?
> 3. this ipfw rules don't work: why ?
These questions are off-topic for freebsd-security since they don't
deal with freebsd security issues. Please don't abuse the mailing
lists by sending off-topic email, and direct your general support
questions to the freebsd-questions@freebsd.org mailing list. Thanks.
Kris
--RnlQjJ0d97Da+TV1
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org
iD8DBQE8IC02Wry0BWjoQKURAmOtAJwOdGrTIYBkXfqWT0SYqtbzGhy+zACgn6TZ
y8nQgfiUp9XcuJanDYZDxkM=
=gDsp
-----END PGP SIGNATURE-----
--RnlQjJ0d97Da+TV1--
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
From owner-freebsd-security Wed Dec 19 5:21:50 2001
Delivered-To: freebsd-security@freebsd.org
Received: from whale.sunbay.crimea.ua (whale.sunbay.crimea.ua [212.110.138.65])
by hub.freebsd.org (Postfix) with ESMTP id 84F9C37B405
for