Berkeley CSUA MOTD:Entry 37640
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2005/5/11-13 [Computer/SW/Security] UID:37640 Activity:nil
5/11    Maybe this is old news, but there is a mit project to prevent addr
        harvesting from known_hosts files:
        http://nms.csail.mit.edu/projects/ssh
        Their paper on ssh worms propogating via info discovered from the
        known_hosts files is interesting:
        http://nms.csail.mit.edu/projects/ssh/sshworm.pdf
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/20-11/7 [Computer/SW/Unix, Finance/Investment] UID:54482 Activity:nil
9/20    How do I change my shell? chsh says "Cannot change ID to root."
        \_ /usr/bin/chsh does not have the SUID permission set. Without
           being set, it does not successfully change a user's shell.
           Typical newbie sys admin (on soda)
           \_ Actually, it does: -rwsr-xr-x 1 root root 37552 Feb 15  2011 /usr/bin/chsh
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2012/2/9-3/26 [Computer/SW/Security, Computer/SW/Unix] UID:54305 Activity:nil
2/9     Reminder: support for mail services has been deprecated for *several
        years*. Mail forwarding, specifically .forward mail forwarding, is
        officially supported and was never deprecated.
        \_ There is no .forward under ~root.  How do we mail root and how do
           we get responses?
           \_ root@csua.berkeley.edu is and always has been an alias.
	...
2011/9/14-12/28 [Computer/SW/Unix] UID:54172 Activity:nil
9/12    We've restored CSUA NFS to something vaguely resembling normal
        functionality -- plus, with some luck, we should now have something
        vaguely resembling normal uptime, too!  Ping root@csua.org if you
        notice any problems.  --jordan
--------------------------------------------------------------------------------
        \_  Oh, and http://irc.CSUA.Berkeley.EDU is online again.
	...
2011/6/5-8/27 [Computer/HW/Memory] UID:54127 Activity:nil
6/5     In an effort to stabilize our services, we'll be rebuilding parts of
        the CSUA infrastructure over the course of this summer.  To give us
        some wiggle room, I've temporarily decreased soda's allocated RAM from
        8GB to 2GB.  If you need to run something that requires large amounts
        of memory, please send mail to root@csua.org and we'll try to
        accommodate your request.  --jordan
	...
2011/4/27-7/30 [Computer/SW/Security, Computer/SW/Unix] UID:54096 Activity:nil
4/28    Will wall be fixed?   - jsl
        \_ What's wall?
           \_ An anachronism from a bygone era, when computers were hard to
              comeby, the dorms didn't have net, there was no airbears, and
              when phones didn't come standard with twitter or sms.
           \_ A non useful implementation of twitter.
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
Cache (3545 bytes)
nms.csail.mit.edu/projects/ssh -> nms.csail.mit.edu/projects/ssh/
If you use SSH, your ssh client stores within your home directory a list that maps the host names and IP addresses of every remote host you have connected to with each host's public key. This database, known as known_ hosts file, has been used by attackers who compromise user accounts, ste al passwords and identity keys, and then use the list of hosts to identi fy targets on which the same password or key can be used to compromise a dditional accounts. It is also possible that worms could use known_hosts data to identify new targets. We have collected known_hosts data from 96 hosts, 14 of which ran the scr ipt as root and submitted data from all user accounts. In total, we rece ived 31,446 anonymized known_hosts entries from 2,077 user accounts. These known_hosts entries lead to a total of 8,009 on 88 valid /8 network s (55% of all valid /8 networks). graph of these /8 networks, with institutional netw orks from which we've collected significant data separated out. The data collection script that was run on these hosts also parsed SSH2 i dentity key files to see what what fraction of these key files had the e ncryption flag set. When collection is compl ete, you will be asked if you are willing to submit it to us and prompte d for a transmission method. If you are behind a firewall, we recommend email submission. Regardless of how the data is transmitted, it will be encrypted first. If you run the script from a user account, only data from that account wi ll be collected. If you can run the script as root, data on all users wi ll be collected. If you plan to run the script as root and use NIS and L DAP, there are additional steps required. ssh/known_hosts * The anonymized IP address of the file server (if any) on which the us er's home directory is mounted * SSH and OS version information. ssh/ directory The last three items enable us to model how, when a host is compromised, the identity keys stored on it may be used to compromise other hosts. README file describes in even greater detail which files collect-s sh reads and how the script encrypts the information it gathers to prese rve your privacy. The recently released version 40 of OpenSSH incorporates a known_hosts h ashing scheme. Upgrading to this version will give your system host hash ing capability. Unfortunately, the feature must be turned on manually vi a configuration options and each known_hosts file must be converted to a hashed format manually. To ease your transition to a hashed hosts confi guration, we have provided installation and configuration instructions f or enabling the hashing option and a conversion tool which will convert all known_hosts files on your system when run as superuser. Instructions for upgrading to OpenSSH 40p1 and enabling hashed h osts on all other platforms Alternatively, if you are unwilling to upgrade to an entirely new version of OpenSSH, we have provided a patch to previous versions of OpenSSH (t ested for versions 39 and 39p1) that hashes host names and IP addresse s in the known_hosts file. READMEhashed-hosts (included with the pa tch) provides a detailed description of the changes made, newly availabl e commands, and known_hosts conversion tool. It is important to note tha t the hashing scheme we originally implemented is not compatible with th at which has subsequently been included in OpenSSH 40 Therefore, if yo u choose to use our patch now and wish to later upgrade to OpenSSH 40, your users will be unable to use entries added to their known_hosts file s after applying the patch.