• Skip to main content
  • Skip to primary sidebar

BSDFreaks.nl

For starters and advanced *BSD users

Tags

brand dmi enschede FreeBSD harddisk Hardware Howto's Howto's move new ports server serverruimte universiteit utwente

Rob

Java Development Kit voor FreeBSD

July 12, 2002 by Rob

De laatste jaren is JAVA zeer populair geworden onder FreeBSD gebruikers als server-side taal.

Enkele FreeBSD community leden hebben het initatief genomen om een stap verderte gaan‚ ze zijn ermee begonnen dit leidde tot de
bouw van de Java Development Kit (JDK) voor FreeBSD. In [url=http://www.onjava.com/pub/a/onjava/2002/07/10/javabsd.html]dit artikel[/url] van Onlamp’s Justin Stepka wordt dit pad van deze community leden nader bekeken evenals de verschillende instalatie opties en hoe te compileren en instaleren van native versie 1.3 van JDK.

Filed Under: *BSD news from the past

Httpd gechroot in OpenBSD

July 12, 2002 by Rob

Theo de Raadt poste op de openbsd-misc mailing list dat httpd voortaan standaard gechroot in /var/www.
Dit heeft als gevolg dat alle soorten ongewilde eigenschappen niet meer werken.

[quote]**********************************
To: misc@cvs.openbsd.org
Subject: httpd changes
From: Theo de Raadt
Date: Tue‚ 09 Jul 2002 15:19:07 -0600
——————————————————————————–

httpd by default now chroot’s into /var/www.

This causes all sorts of fancy features to break. Fancy features which
we believe to be quite unsafe.

If you don’t like this behaviour‚ use the -u flag for httpd_flags in
/etc/rc.conf to get back to the way it used to be. We bet that when
the next bug in apache comes‚ you’ll regret it though.

This is the best approach we can currently take against such a
monolothic piece of software with such bad behaviours. It is just too
big to audit‚ so for simple usage‚ we are constraining it to within
that jail.

When you turn the -u flag on and off‚ no other configuration changes
are needed.

All this is documented.

Good luck.
[/quote]

Voor meer informatie hierover lees de volgende [url=http://www.sigmasoft.com/~openbsd/archive/openbsd-misc/200207/threads.html#00639]Thread[/url]

Filed Under: *BSD news from the past

FreeBSD Release plan 4.6.1 en 5.0

July 12, 2002 by Rob

Bron: [url=http://www.freebsd.org/releng/index.html]Freebsd.org[/url]
Bij de volgende release van FreeBSD (17 juli 2002 versie 4.6.1.) wordt SSH en BIND upgedate‚ dit omdat huidige SSH en BIND niet meer veilig zijn.
Hiernaast is er een belangrijke update in de ATA driver en er zijn andere kleine veranderingen.

Ook voor de nieuwe FreeBSD 5.0 wordt een developer preview uitgebracht op 25 Juli. Hiervan zal een volledig package-set aanwezig zijn en een ISO image.

Filed Under: *BSD news from the past

FreeBSD-STABLE nu met OpenSSH 3.4p1

July 4, 2002 by Rob

Ik kreeg een aankonding in mijn mailbox dat OpenSSH 3.4 nu in het base system zit (hij zat natuurlijk al in de ports)
[quote]
I finished the upgrade a little over an hour ago‚ and my post-commit
buildworld just completed. It should now be safe to upgrade.

Privilege separation is turned off by default‚ because it breaks
Kerberos ticket passing. If you don’t use ticket passing‚ or don’t
know what Kerberos is‚ it should be safe to turn privilege separation
on in /etc/ssh/sshd_config (after make world and mergemaster‚ of
course.)

Please stay alert for any signs of ssh (particularly sshd) trouble‚ or
unexpected changes in OpenSSH’s behaviour‚ including unexpected
changes in configuration defaults.

DES
[/quote]

Filed Under: *BSD news from the past

Gevaarlijke worm Apache actief op FreeBSD

June 29, 2002 by Rob

Gister kwam op de FreeBSD security mailinglist een melding van een gevaarlijke worm
die op apache 1.3.24 en FreeBSD actief is. Binnen 3 uur was de binary gedeassembleerd en kon
het effect bekeken worden. Later dook ook de source code nog eens op.
Het doel van de trojan was om een DoS aanval uit te voeren op dit adres: 12.127.17.71.
[url=http://dammit.lt/apache-worm/]Meer info[/url]

De worm is als volgt te herkennen:
[quote]
This was spotted on our real-time honeypot systems
(running Apache 1.3.24‚ of course)

bash-2.05a$ ls -la /tmp
total 128
drwxrwxrwt 3 root wheel 512 Jun 28 14:02 .
-rwxr-xr-x 1 nobody wheel 51626 Jun 28 08:25 .a
-rw-r–r– 1 nobody wheel 70563 Jun 28 08:25 .uua
[/quote]

Dus zorg er zeker voor dat je je apache updated

Filed Under: *BSD news from the past

Interview met een voormalig FreeBSD engineer J. Hubbard

June 21, 2002 by Rob

Kerneltrap heeft een interview met Jordan Hubbard gepubliceerd. Deze mede oprichter van het FreeBSD project en momenteel werkzaam bij Apple. Niet zo lang geleden is hij gestopt met het werken aan het FreeBSD project.

In dit interview vertelt hij over zijn huidige werk en over zijn vroegere werk als FreeBSD developer.

[url=http://kerneltrap.org/node.php?id=278]Het interview[/url]
[url=http://daily.daemonnews.org/view_story.php3?story_id=2837]Zijn reden om te stoppen met FreeBSD[/url]

Filed Under: *BSD news from the past

FreeBSD 4.6 echt gereleased

June 16, 2002 by Rob

De nieuwe FreeBSD release is dan echt een feit‚ er zijn wat onechte berichten geweest o.a. op /. maar nu trof ik toch echt een pgp signed message in mijn mailbox aan dat 4.6 gereleased is.

Voor de release notes: [url=http://www.FreeBSD.org/releases/4.6R/relnotes.html]klik hier[/url]

Dus cvsup je sources en maak die wereld opnieuw.

Een quote van de announce mail:
[quote]
I am happy to announce the availability of FreeBSD 4.6-RELEASE‚ the
very latest release on the FreeBSD -STABLE development branch. Since
FreeBSD 4.5-RELEASE in January 2002‚ we have made hundreds of fixes‚
updated many system components‚ and addressed a wide variety of
security issues.

One of the most significant changes in FreeBSD 4.6 is the adoption of
XFree86 4.2.0 as the default version of the X Windows System. We
encourage users (particularly those upgrading from older installations
of XFree86) to consult the relevant section of the FreeBSD Handbook
for information on installing and configuring XFree86 4.2.0. This
information can be found on-line at:

[url]http://www.FreeBSD.org/handbook/x11.html[/url]

On systems with the doc distribution installed‚ it can also be found
at:

/usr/share/doc/en_US.ISO8859-1/books/handbook/x11.html

A number of enhancements to network device drivers have been made‚ as
well as updates to the ATA storage subsystem.

Some contributed programs have been updated‚ such as sendmail
(updated to 8.12.3) and the ISC DHCP client (updated to 3.0.1RC8).

For more information about the most significant changes with this
release of FreeBSD‚ please see the release notes:

[url]http://www.FreeBSD.org/releases/4.6R/relnotes.html[/url]

It is also useful to peruse the errata file‚ as it contains
late-breaking news about the release:

[url]http://www.FreeBSD.org/releases/4.6R/errata.html[/url]

For more information about FreeBSD release engineering activities
(including a schedule of upcoming releases)‚ please see:

[url]http://www.FreeBSD.org/releng/[/url]

Availability
————

FreeBSD 4.6-RELEASE supports the i386 and alpha architectures and can
be installed directly over the net using the boot floppies or copied
to a local NFS/FTP server. Distributions for the i386 are available
now. Final builds for the alpha architecture are in progress and will
be made available shortly.

We can’t promise that all the mirror sites will carry the larger ISO
images‚ but they will at least be available from:

ftp://ftp.FreeBSD.org/pub/FreeBSD/
ftp://ftp2.FreeBSD.org/pub/FreeBSD/
ftp://ftp.au.FreeBSD.org/pub/FreeBSD/
ftp://ftp.cz.FreeBSD.org/pub/FreeBSD/
ftp://ftp.lt.FreeBSD.org/pub/FreeBSD/
ftp://ftp.nctu.edu.tw/FreeBSD/

If you can’t afford FreeBSD on media‚ are impatient‚ or just want to
use it for evangelism purposes‚ then by all means download the ISO
images‚ otherwise please continue to support the FreeBSD Project by
purchasing media from one of our supporting vendors. The following
companies have contributed substantially to the development of
FreeBSD:

FreeBSD Mall‚ Inc. http://www.freebsdmall.com/
FreeBSD Services Ltd. http://www.freebsd-services.com/
Daemon News http://www.bsdmall.com/freebsd1.html

Each CD or DVD set contains the FreeBSD installation and application
package bits for the i386 (“PC”) architecture. For a set of distfiles
used to build ports in the ports collection‚ please see the FreeBSD
Toolkit‚ a 6 CD set containing extra bits which no longer fit on the 4
CD set‚ or the DVD distribution from FreeBSD Services Ltd.
[/quote]

Filed Under: *BSD news from the past

[OpenBSD] Securing Small Networks Part 4

June 15, 2002 by Rob

Deze howto gaat net als deel 1, 2 en 3 over het beveiligen van je netwerk met OpenBSD als router / firewall. Deze keer bespreekt de schrijver Packet Logging met PF.

[quote]Packet logging is a good network administration practice, because it lets us spot problems with communication and early signs of break-in attempts. Of course, logging packets alone won’t help; we need to learn how to analyze and manage log files generated by pf. But first things first.
[/quote]

[url=http://www.onlamp.com/pub/a/bsd/2002/06/06/ssnwopenbsd.html]Het artikel[/url]

Filed Under: OpenBSD

Nieuw FreeBSD IPFW beta code beschikbaar

June 11, 2002 by Rob

Bron: [url=http://www.bsdforums.org/forums/showthread.php?threadid=1126]BSDForums[/url]

Luigi Rizzo heeft de ipfw code( userland + kernel ) uitgebreid herscheven hiermee te pogen de code sneller en flexibeler te maken.

[quote]Date: Sat‚ 8 Jun 2002 20:19:09 -0700
From: Luigi Rizzo
To: ipfw@freebsd.org
Subject: New ipfw code available
Message-ID: <20020608201909.A41807@iguana.icir.org>

[Bcc to -current because it is relevant there as well — sorry for the
crosspost]

Hi‚
over the past 2-3 weeks I have done an extensive rewrite of the
ipfw code (userland + kernel) in an attempt to make it faster and
more flexible.

The idea (which I discussed a few times on the mailing lists) was
to replace the current ipfw rules (macroinstructions) with a set
of microinstructions‚ each of them performing a single operation
such as matching an address‚ or a port range‚ or a protocol flag‚
etc. — much in the spirit of BPF and derivatives — and to let
the userland front-end compile ipfw(8) commands into an appropriate
set of microinstructions.

There are several advantages in using this technique: first of all‚
instructions are typically shorter and faster‚ because the former
code had to check for the presence of all the possible options in
a rule‚ whereas the new one can simply do just the things that are
required — e.g. an instruction like

allow ip from 1.2.3.0/24 to any

translates to a couple of microinstructions (whose complete
implementation is below the instructions themselves):

O_IP_DST
if (((ipfw_insn_ip *)cmd)->addr.s_addr ==
(dst_ip.s_addr & ((ipfw_insn_ip *)cmd)->mask.s_addr))
goto cmd_match;
goto cmd_fail;

O_ACCEPT:
retval = 0; /* accept */
goto accept;

But there is a lot more — the instruction set is easily extensible‚
and without backward compatibility problems. Furthermore‚ you can
build (and I have already implemented them) more complex rules by
assembling microinstructions with OR and NOT operands. I.e. you can write
something like:

pipe 10 tcp from 1.2.3.4 or 1.2.3.7 or not 1.2.3.0/28 21-25‚1024-4095
to any in recv ed0 or recv fxp1 or recv dc0 uid 35 or uid 50

You get the idea…

I have a fairly complete version of the above code at the moment‚
which is only missing a small set of functionalities
(ip/tcp flags matching‚ “log” and fixing hooks to the stateful
code). However the glue to implement all the missing pieces is
already there‚ it is just a matter of adding a few lines of code
and testing things.
Other than that‚ the code is meant to be fully compatible with the
old syntax so you will not have to rewrite your existing rulesets.

I have put a preliminary snapshot of this code (for CURRENT) at

http://info.iet.unipi.it/~luigi/ipfw5.20020609.tgz

It replaces the following files from a recent (2002/05/14) version of -current.

sys/netinet/ip_dummynet.c
sys/netinet/ip_fw.c
sys/netinet/ip_fw.h
sbin/ipfw/ipfw.c

I would be very grateful if someone could have a look at the
code‚ maybe give it a try‚ and see e.g. how it compiles your
typical ruleset and whether the new extensions can make your
ipfw rulesets simpler.

Feedback welcome‚ both on the architecture and on the implementation.

NOTE: if people wonder why I did not use BPF and reinvented the wheel:
the keyword is “backward compatiblity” — i thought it was a bit too
complex to compile the existent ipfw syntax into BPF‚ especially because
BPF at least as far as i know does not handle UIDs‚ and GIDs and
interface matches and different “actions” than match or not match‚
so i would have had to extend the code anyways‚ at which point i
thought I could as well write my own microinstruction set…

cheers
luigi
———————————–+————————————-
Luigi RIZZO‚ luigi@iet.unipi.it . Dip. di Ing. dell’Informazione
http://www.iet.unipi.it/~luigi/ . Universita` di Pisa
TEL/FAX: +39-050-568.533/522 . via Diotisalvi 2‚ 56126 PISA (Italy)
Mobile +39-347-0373137
———————————–+————————————-
to

thanks
luigi
[/quote]

Filed Under: *BSD news from the past

[FreeBSD] Installing GlFtpd

June 3, 2002 by Rob

GlFtpd is een zeer configureerbare ftp server welke je beheerd via de ftp console. Je werkt met virtuele users waardoor je dus onafhankelijk bent van de shell users van je base systeem.

Als eerst gaan we de packages ophalen.

[shell]# cd ~
# fetch http://www.glftpd.com/oldpage/glftpd-LNX_1.26.tgz
# fetch http://www.glftpd.com/oldpage/glftpd-FBSD4_1.26.binsonly.tgz
[/shell]

Nu ff uitpakken

[shell]# tar xzf glftpd-LNX_1.26.tgz && tar xzf glftpd-FBSD4_1.26.binsonly.tgz
# cd glftpd-LNX_1.26
[/shell]

Nu kan je het install script draaien.

[shell]# ./installgl.sh
Welcome to jehsom’s glFtpD installer‚ version 1.06
Please enter the directory to install glftpd to [/glftpd]: /usr/local/etc/glftpd

– – – –
| | | |
| | | |
| | | |
– – – –
Enter the port you woud like glftpd to listen on [21]: 21

Congratulations‚ glFtpD has been installed. Scroll up and note any errors that need fixing. A log of the installation script is in ./installgl.debug
To get your site running‚ you must edit /etc/glftpd.conf according to the
instructions in /usr/local/etc/glftpd/glftpd.docs. For help‚ visit #glftpd on EFnet.
After configuring glftpd‚ visit my scripts page at http://scripts.jehsom.com
and the glftpd pages at http://www.glftpd.com and http://www.glftpd.org‚
and pick up some scripts to give your site some style!

Thanks for your support!
jehsom and the glFtpD team
[/shell]

Nu de FreeBSD package installeren.

[shell]# cd ../glftpd-FBSD4_1.26.binsonly
# cp * /usr/local/etc/glftpd/bin/
[/shell]

We gaan nu even tegen de documentatie in NIET inetd gebruiken omdat deze daemon niet echt meer van deze tijd is‚ in plaats daarvan gaan we tcpserver gebruiken. Tcpserver is bestand tegen DoS aanvallen en heeft betere filter mogelijkheden. Tcpserver is onderdeel van ucspi-tcp package dus die installeren we. Je kan meer informatie over tcpserver vinden op [url]http://cr.yp.to/ucspi-tcp/tcpserver.html[/url].

[shell]# cd /usr/ports/sysutils/ucspi-tcp
# make install clean
[/shell]

We gaan zelf een opstart script maken.

[shell]# ee /usr/local/etc/rc.d/glftpd.sh
[/shell]

En hierin zetten we:

[shell]#!/usr/local/bin/bash
PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/sbin
export PATH
exec tcpserver -DHRl0 0 21021 /usr/local/etc/glftpd/bin/glftpd -l -o -i -n 1 -r /etc/glftpd.conf -s/usr/local/etc/glftpd/bin/glstrings.bin 2>&1 &
[/shell]

Save deze file en dan moeten we deze executable maken en uitvoeren

[shell]# chmod +x /usr/local/etc/rc.d/glftpd.sh
# /usr/local/etc/rc.d/glftpd.sh
[/shell]

We nemen eerst poort 21021‚ de server is beveiligd dus je kan niet meteen poort 21 pakken‚ om hem te testen en te configureren.
Even inloggen om de boel te configureren.

[shell]# ftp localhost 21021
[/shell]

Gebruik nu als username/password: glftpd/glftpd
En als het goed is zie je dan het volgende schermpje!

[shell]230- _____
230- ______________________________|__ |____ ________________________________
230- _ / _ / _ / | | _ / _ / _ /
230- / / / /____/. | | / / /____/. /_____/
230- ________/____/ /______ |___|____|___/ /______ |____|
230- .-=———– /____/ —- |____| ——— /____/ —- |____| ——-=-.
230- `-=——————————————————————-=-‘
230- `—–( Type ‘site onel MESSAGE’ to enter your message )—–‘
230 User glftpd logged in.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp>
[/shell]

Ok dat is gelukt!
Nu de server configureren.
We gaan een admin user toevoegen.

[shell]ftp> site adduser admin password *@192.168.1.1
ftp> site change admin flags +1
[/shell]

Er mag nu door admin alleen ingelogd worden vanaf 192.168.1.1.
Nu kan je de server op poort 21 zetten als je dat wilt.

[shell]# ee /usr/local/etc/rc.d/glftpd.sh

#!/usr/local/bin/bash
PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/sbin
export PATH
exec tcpserver -DHRl0 0 21 /usr/local/etc/glftpd/bin/glftpd -l -o -i -n 1 -r /etc/glftpd.conf -s/usr/local/etc/glftpd/bin/glstrings.bin 2>&1 &
[/shell]

Probeer nu eens in te loggen vanaf een remote client (192.168.1.1)
Lukt dit? Dan kan je users gaan toevoegen..

Wil je meer commando’s oid weten raadpleeg dan de [url=http://www.glftpd.com/oldpage/glftpd.docs]documentatie[/url].

Kom je er niet uit… 😉 Dan kan je altijd je vragen kwijt op het forum of irc..

Filed Under: FTP server

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 66
  • Page 67
  • Page 68
  • Page 69
  • Page 70
  • Interim pages omitted …
  • Page 83
  • Go to Next Page »

Primary Sidebar

Pages

  • Howto overview
  • iPhone mail setup
  • Links

Categories

  • *BSD news from the past
  • Console
  • Firewall
  • FreeBSD
  • FTP server
  • Hardware
  • Howto's
  • Installation
  • Kernel
  • Mail server
  • Miscellaneous
  • Networking
  • News
  • News imported
  • OpenBSD
  • Operating System
  • Programming
  • Security
  • Site news
  • Software
  • Sysutils
  • Web server

Recent Comments

  • admin on Qmail FreeBSD Mail Toaster Spam en virus control addon
  • admin on [FreeBSD] Het opzetten van een Vlan
  • Jap on [FreeBSD] Installing GlFtpd
  • Jap on [FreeBSD] Installing GlFtpd
  • Crashjuh on Wireless access point met OpenBSD + VPN

Copyright © 2025 · Genesis Sample Theme on Genesis Framework · WordPress · Log in