• Skip to main content
  • Skip to primary sidebar

BSDFreaks.nl

For starters and advanced *BSD users

Tags

brand dmi enschede FreeBSD harddisk Hardware Howto's Howto's move new ports server serverruimte universiteit utwente

[FreeBSD] Backing up Files with Tar

May 24, 2002 by Rob

Bron: [url=http://www.onlamp.com]Onlamp[/url]

Met deze howto leer je hoe je met Tar makkelijk backups kan maken en hoe je deze backups weer kan restoren.

[url=http://www.onlamp.com/pub/a/bsd/2002/05/23/FreeBSD_Basics.html]De howto[/url]

Filed Under: FreeBSD

Hackers kunnen veel in minder dan een minuut kraken

May 22, 2002 by Rob

Bron: [url=http://news.com.com]Cnet[/url]

Hackers kunnen de meeste grote systemen makkelijk binnendringen omdat veel mensen veel te makkelijke password kiezen. In het volgende artikel kan je daar meer over lezen.

[quote]Retrieving the password file from one of the health care company’s servers‚ the consulting firm put “John the Ripper‚” a well-known cracking program‚ on the case. While well-chosen passwords could take years–if not decades–of computer time to crack‚ it took the program only an hour to decipher 30 percent of the passwords for the nearly 10‚000 accounts listed in the file.
[/quote]

[url=http://news.com.com/2009-1001-916719.html?tag=fd_lede]Het hele artikel[/url]

Filed Under: *BSD news from the past

Proef internet via het stopcontact verlengd

May 22, 2002 by Rob

Bron: [url=http://www.webwereld.nl]Webwereld[/url]

De bestaande proef in de Arnhemse wijk Rijkerswoerd wordt voortgezet, zo zegt Nuon-woordvoerder Bart Sikking. Deze proef ging eind vorig jaar van start en zou in eerste instantie in februari van dit jaar moeten zijn afgesloten. Het ziet er echter niet naar uit dat het energiebedrijf binnenkort uitgeëxperimenteerd is.

Rijkerswoerd is namelijk door Nuon gebombardeerd als ‘semi-permanente proeftuin’. Aan de ‘Digistroom’-proef doen 180 huishoudens mee, die volgens Sikking zeer tevreden zijn. Bij powerline communication – zoals de techniek wordt genoemd – wordt internet aangeboden via het laagspanningsnet dat de woningen binnenkomt.

Hierbij worden de internet-signalen door speciale apparatuur gescheiden van de stroom. Naast de beschikbare bandbreedte zien de testpersonen de beschikbaarheid in het hele huis (zonder zelf een netwerk te hoeven aanleggen) als grootste voordeel.

[url=http://www.webwereld.nl/nieuws/11223.phtml]Het hele artikel[/url]

Filed Under: *BSD news from the past

Gnome2 Beta5 geport naar FreeBSD

May 22, 2002 by Rob

Het FreeBSD Gnome Team is klaar met het porten van Gnome2 naar FreeBSD. Dit houdt in dat Gnome2 eenvoudig vanuit de port geinstalleerd kan worden.
Het is zelfs de bedoeling om Gnome2 met FreeBSD 4.6 (die over 10 dagen uitkomt) mee te leveren.

[url=http://www.freebsd.org/gnome/newsflash.html]Het FreeBSD Gnome Team[/url]
[url=http://people.freebsd.org/~sobomax/gnome2.beta5.png]Screenshot[/url]

Filed Under: *BSD news from the past

Optical Disc Hits 100GB

May 21, 2002 by Rob

Bron: [url=http://www.pcworld.com/]PCWorld[/url]

Een research team van de ‘National Taiwan University’ melden dat ze een prototype hebben ontwikkeld van een optische disc die 100 GB aan informatie kan bevatten.

[quote]The 100GB disc is expected to become commercially available in 2004, when applications such as high-definition TV will create demand for larger storage capacities, said Din Ping Tsai, the professor at NTU who led the research team.
[/quote]

[url=http://www.pcworld.com/news/article/0,aid,100284,00.asp]Het hele artikel[/url]

Filed Under: *BSD news from the past

FreeBSD Security Advisory: bzip2 & k5su

May 20, 2002 by Rob

Bron: [url=http://www.freebsd.org/support.html#mailing-list]FreeBSD Mailing Lists[/url]

Ik kreeg net 2 mailtjes met security bugs.

Mailtje 1

[quote]FreeBSD-SA-02:25 Security Advisory
The FreeBSD Project

Topic: bzip2 contains multiple security vulnerabilities

Category: core/ports
Module: bzip2
Announced: 2002-05-20
Credits: Volker Schmidt‚ Philippe Troin
Affects: FreeBSD 4.4-RELEASE‚ FreeBSD 4.5-RELEASE‚
FreeBSD 4.5-STABLE prior to the correction date.
bzip2 port prior to bzip2-1.0.2
Corrected: 2002-02-18 09:12:53 UTC (4.5-STABLE‚ RELENG_4)
2002-02-23 18:28:09 UTC (4.5-RELEASE-p1‚ RELENG_4_5)
2002-02-23 18:33:18 UTC (4.4-RELEASE-p8‚ RELENG_4_4)
2002-02-22 13:21:22 UTC (bzip2 port)
FreeBSD only: NO

I. Background

bzip2 is an advanced block-sorting file compression utility.

II. Problem Description

When creating a file during decompression‚ the bzip2 utility failed
to use the O_EXCL flag‚ potentially overwriting files without warning.
In addition‚ the bzip2 utility did not securely create new files
causing a race condition between creating the file and setting the
correct permissions.

When compressing a file pointed to by a symbolic link‚ the bzip2
utility incorrectly stored the permissions of the symbolic link
instead of the file. This may result in potentially lax file
permissions (rwxr-xr-x)‚ causing the decompressed file to be
world-readable.

bzip2 was incorporated into FreeBSD prior to FreeBSD 4.4-RELEASE.
Previous versions of FreeBSD did not contain bzip2 and are unaffected
unless bzip2 was installed from the ports collection or manually by
the system administrator.

III. Impact

1) Files may be inadvertently overwritten without warning.

2) Due to the race condition between creating files and setting proper
permissions‚ a local user may be able to read the contents of files
regardless of their intended permissions.

3) Decompressed files that were originally pointed to by a symbolic
link may end up with in incorrect permissions‚ allowing local users
to view their contents.

IV. Workaround

1) Deinstall the bzip2 port/package if you have it installed.

V. Solution

[FreeBSD 4.4 or 4.5 base system]

1) Upgrade your vulnerable system to 4.5-STABLE or the RELENG_4_4 or
RELENG_4_5 security branch dated after the respective correction dates.

2) To patch your present system‚ download the relevant patch from the
below location‚ and execute the following commands as root:

# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:25/bzip2.patch
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:25/bzip2.patch.asc

Verify the detached PGP signature using your PGP utility.

This patch has been verified to apply to FreeBSD 4.4-RELEASE and
4.5-RELEASE.

# cd /usr/src
# patch -p < /path/to/patch # cd lib/libbz2 # make depend && make all install # cd ../../usr.bin/bzip2 # make depend && make all install 3) FreeBSD 4.4-RELEASE and 4.5-RELEASE systems: An experimental upgrade package is available for users who wish to provide testing and feedback on the binary upgrade process. This package may be installed on FreeBSD 4.4-RELEASE and 4.5-RELEASE systems only‚ and is intended for use on systems for which source patching is not practical or convenient. If you use the upgrade package‚ feedback (positive or negative) to security-officer@FreeBSD.org is requested so we can improve the process for future advisories. During the installation procedure‚ backup copies are made of the files which are replaced by the package. These backup copies will be reinstalled if the package is removed‚ reverting the system to a pre-patched state. # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/packages/SA-02.25/security-patch-bzip2-02.25.tgz # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/packages/SA-02.25/security-patch-bzip2-02.25.tgz.asc Verify the detached PGP signature using your PGP utility. # pkg_add security-patch-bzip2-02.25.tgz [ports] 1) Upgrade your entire ports collection and rebuild the bzip2 port. 2) Deinstall the old package and install a new package dated after the correction date‚ obtained from the following directories: [i386] ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/archivers/ ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/archivers/ [alpha] Packages are not automatically generated for the alpha architecture at this time due to lack of build resources. NOTE: It may be several days before updated packages are available. Be sure to check the file creation date on the package‚ because the version number of the software has not changed. 3) Download a new port skeleton for the bzip2 port from: http://www.freebsd.org/ports/ and use it to rebuild the port. 4) Use the portcheckout utility to automate option (3) above. The portcheckout port is available in /usr/ports/devel/portcheckout or the package can be obtained from: ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/Latest/portcheckout.tgz ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/Latest/portcheckout.tgz VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. [Ports collection] [/quote] Mailtje 2 [quote]FreeBSD-SA-02:24.k5su Security Advisory The FreeBSD Project Topic: k5su utility does not honor `wheel' group Category: kerberos5 Module: kerberos5/usr.bin/k5su Announced: 2002-05-20 Credits: jmallet@FreeBSD.org Affects: FreeBSD 4.4-RELEASE FreeBSD 4.5-RELEASE FreeBSD-STABLE prior to the correction date Corrected: 2002-05-15 12:51:30 UTC (RELENG_4) 2002-05-15 12:56:21 UTC (RELENG_4_5) 2002-05-15 13:04:00 UTC (RELENG_4_4) FreeBSD only: YES I. Background The k5su utility is a SU utility similar to su(1)‚ and is used to switch privileges after authentication using Kerberos 5 or the local passwd(5) file. k5su is installed as part of the `krb5' distribution‚ or when building from source with MAKE_KERBEROS5 set. Neither of these are default settings. II. Problem Description Historically‚ the BSD SU utility only allows users who are members of group `wheel' (group-ID 0) to obtain superuser privileges. The k5su utility‚ however‚ does not honor this convention and does not verify group membership if a user has successfully authenticated. k5su also lacks other features of su(1)‚ such as checking for password expiration‚ implementing login classes‚ and checking for the target user's login shell in /etc/shells. III. Impact Contrary to the expectations of many BSD system administrators‚ users not in group `wheel' may use k5su to attempt to obtain superuser privileges. Note that this would require knowledge of the root account password‚ or an explicit entry in the Kerberos 5 `.k5login' ACL for the root account. IV. Solution Remove the set-user-ID bit from the k5su utility: # chmod u-s /usr/bin/k5su This will completely disable k5su. Sites which wish to use Kerberos 5 authentication for SU and are comfortable with its limitations may choose to leave the set-user-ID bit enabled. As of the correction date‚ FreeBSD (including the upcoming 4.6-RELEASE) will install k5su if requested‚ but the set-user-ID bit will not be enabled by default. See also the ENABLE_SUID_K5SU option in make.conf(5). VI. Correction details The following list contains the revision numbers of each file that was corrected in FreeBSD. [/quote]

Filed Under: *BSD news from the past

FreeBSD 4.6-RC2 beschikbaar

May 20, 2002 by Rob

Bron: [url=http://docs.freebsd.org]FreeBSD Mail Archive[/url]

[download]http://ftp.au.freebsd.org/pub/FreeBSD/releases/i386/4.6-RC2/[/download]

FreeBSD 4.6-RC2 is beschikbaar op alle ftp mirrors. Om het OS grondig te testen kan je [url=http://www.FreeBSD.org/releases/4.6R/qa.html]hierheen[/url] gaan.

[quote]The other mirrors should pick up the release soon. This candidate
fixes the sysinstall buffer truncation issue that prevented the
successful installation of GNOME with 4.6-RC1. There have been very
few other changes between the two releases‚ so bug reports against RC1
are still very much appreciated. Unless any other major issues crop
up before hand‚ we will release another RC in 5-7 days.
[/quote]

[url=http://docs.freebsd.org/cgi/getmsg.cgi?fetch=10276+0+current/freebsd-stable]Het hele artikel[/url]

Filed Under: *BSD news from the past

OpenBSD 3.1 released

May 19, 2002 by Rob

Bron: [url=http://www.openbsd.org]OpenBSD.org[/url]

OpenBSD 3.1 is vandaag gereleased!

[download]ftp://ftp.nl.uu.net/pub/OpenBSD[/download]

[quote][b]What’s new?[/b]

OpenSSH (supporting both the SSH1 and SSH2 protocols) is now at version 3.2. Secure file transfers are encouraged using the greatly enhanced SFTP subsystem which comes both with an SFTP server and client.

As usual‚ improvements to the documentation‚ notably the man pages and the Web FAQ. A larger part of the website is now available in several languages.

More complete collection and better tested set of “ports”.

Over 1000 pre-built and tested packages.

Greatly improved hardware support in the OpenBSD/sparc64 port‚ and the addition of X11 support.

Numerous performance improvements to the OpenBSD/macppc port‚ as well as accelerated X11 servers for some models.

A lot of enhancements to our new packet filter‚ pf‚ including performance improvements‚ as well as the ability to filter other protocols than the usual tcp‚ udp and icmp‚ such as esp.

An utility to achieve per-user pf rules changes‚ typically intended for gateways‚ authpf.

The in-kernel software raid (RAIDframe) can now automatically detect and configure its raid devices at boot. Taking advantage of this‚ the system can have its root partition directly mounted from an auto-detected raid partition.

Wavelan bridging is now possible on Prism-II based cards.

The system includes the following major components from outside suppliers:

XFree86 4.2.0 (and i386 contains 3.3.X servers also‚ thus providing support for all chipsets)
gcc 2.95.3 (+ patches)
perl 5.6.1 (+ patches)
Apache 1.3.24‚ mod_ssl 2.8.8‚ OpenSSL 0.9.6b (+ patches)‚ DSO support
groff 1.15
sendmail 8.12.2
lynx 2.8.2rel.1 with HTTPS support added
sudo 1.6.5p2
ncurses 5.2
Latest KAME IPv6
KTH Kerberos 1.0.8
Heimdal 0.4e (+ patches)
OpenSSH 3.2

Many improvements for security and reliability.
[/quote]

[url=http://www.openbsd.org/31.html]Lees verder[/url]

Filed Under: *BSD news from the past

FreeBSD 4.6-RC1 beschikbaar

May 19, 2002 by Rob

Bron: [url=http://daily.daemonnews.org]Daily Daemon News[/url]

[download]ftp://ftp2.FreeBSD.org/pub/FreeBSD/releases/i386/ISO-IMAGES/4.6/4.6-RC1-install.iso[/download]

FreeBSD 4.6-RC1 is beschikbaar op alle ftp mirrors en iedereen wordt gevraagd om deze release te testen. Voor deze test is een speciale [url=http://www.FreeBSD.org/releases/4.6R/qa.html]testguide[/url] zodat de tests optimaal worden uitgevoerd.

[quote]I’d also like to welcome Brian Somers and Bruce A. Mah to the release engineering team. They’ve been a huge help so far. This release candidate was built by Brian.

Known Problem :

Due to a buffer truncation in sysinstall‚ the gnome meta-port in 4.6-RC1 does not install correctly. This has been fixed and will be functional for the next release candidate.
[/quote]

[url=http://daily.daemonnews.org/view_story.php3?story_id=2890]Het hele artikel[/url]

Filed Under: *BSD news from the past

BSDFreaks weer up!

May 19, 2002 by Rob

Door een nogal stomme fout was BSDFreaks vanochtend offline. Er is wat data verloren gegaan maar niks ernstigs. De gebruikers die zich geregistreerd hebben na 26 maart moeten een nieuw password aanvragen via deze [url=http://www.bsdfreaks.nl/index.php/forum_login]link[/url].

Mocht je nog iets tegenkomen wat volgens jou niet helemaal klopt‚ meld dit dan even op het Bug forum.

And back to BSD 🙂

Filed Under: Site news

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 69
  • Page 70
  • Page 71
  • Page 72
  • Page 73
  • Interim pages omitted …
  • Page 83
  • Go to Next Page »

Primary Sidebar

Pages

  • Howto overview
  • iPhone mail setup
  • Links

Categories

  • *BSD news from the past
  • Console
  • Firewall
  • FreeBSD
  • FTP server
  • Hardware
  • Howto's
  • Installation
  • Kernel
  • Mail server
  • Miscellaneous
  • Networking
  • News
  • News imported
  • OpenBSD
  • Operating System
  • Programming
  • Security
  • Site news
  • Software
  • Sysutils
  • Web server

Recent Comments

  • admin on Qmail FreeBSD Mail Toaster Spam en virus control addon
  • admin on [FreeBSD] Het opzetten van een Vlan
  • Jap on [FreeBSD] Installing GlFtpd
  • Jap on [FreeBSD] Installing GlFtpd
  • Crashjuh on Wireless access point met OpenBSD + VPN

Copyright © 2025 · Genesis Sample Theme on Genesis Framework · WordPress · Log in