Berkeley CSUA MOTD:Entry 17825
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2000/3/22-23 [Computer/SW/Security] UID:17825 Activity:insanely high
3/22    SHIT!  My linux gateway running ipchains got cracked.
        How?  --PeterM
        \_ Run a BSD.  Any BSD.  No, really.  Linux sucks.
           \_ How about:
              BSD security >> Linux security, but Linux is getting there
                \- realistically i think there are just more linux
                root kits floating around. same reason more solaris
                boxes get cracked than say ultrix.irix machines. --psb
                \_ In my experience, VMS security >> HP security >>
                   SUN security >> IRIX security >> Linux security >>
                   Windows security. IRIX really sucks and SGI ships
                   the OS wide-open. --dim
                        \- i work in this area so my data is based on a lot
                        of machines and not just on my experience. most people
                        cracking systems are just trying a lot of doors and
                        arent picking locks. the doors the usually get into
                        arent necessarily the easiest ones to pick but the
                        ones with the most spare keys floating around or the
                        most likely to have been left unlocked. VMS machines
                        arent cracked because very few people have access
                        to them, or sources etc. i agree solaris security is
                        better than irix security but there are more suns
                        and more peopel have access to suns ... hence more
                        solaris root kits. --psb.
                        solaris root kits. a lot of the weeinie crackers
                        dont even know the difference ... you see people
                        using solaris eject cracks on irix machines all the
                        time. you know you are dealing with a clown when a
                        cracker's editor of choice is pico. [which it is
                        more and more often these days] --psb
                        \_ I agree completely. I just wanted to point out
                           how much IRIX sucks. --dim
                                \- back in the old days suns used to "ship"
                        with + in /etc/hosts.equiv. it only took a few years
                        for sun to admit they had their head up their ass on
                        on that one. SGI was even more intrasigent about the
                        lp/guest etc accounts. whenever you would complain to
                        SGI they would either point to "small print" or defend
                        what they did with "we know better" ... well apparently
                        "the market" knew better. --psb
        \_ sendmail, dns, irc, ftp, what else are you running?
           \_ no ftp, irc.  Running sendmail as an smtp server for
              the internal network, but blocking connections from
              outside.  Running DNS.  Nothing else that I know of
              offhand.
                \_ move DNS serving to an internal machine. This
                   will take some of the load off and also close
                   a potential security hole. I also switched to
                   to postfix which seems to be more secure than
                   sendmail.
                \_ In recent history, all of those other daemons have
                   had a lot more security problems than sendmail.
                                \_ I haven't seen as many CERT warnings
                                   about postfix as for sendmail and
                                   qmail.
                        \- what version of named? are you running named
                        unprivilaged and chrooted? this was a common attack
                        on freebsd. --psb
              \_ what are your rules?  wuftpd supposedly has some buffer
                 overflow exploits.
                 \_ "no ftp"?
        \_ RedHat 6.1?
        \_ an inside job?
                \_ a blown job?
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/20-11/7 [Computer/SW/Unix, Finance/Investment] UID:54482 Activity:nil
9/20    How do I change my shell? chsh says "Cannot change ID to root."
        \_ /usr/bin/chsh does not have the SUID permission set. Without
           being set, it does not successfully change a user's shell.
           Typical newbie sys admin (on soda)
           \_ Actually, it does: -rwsr-xr-x 1 root root 37552 Feb 15  2011 /usr/bin/chsh
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...