Wikiposts
Search
Computer/Internet Issues & Troubleshooting Anyone with questions about the terribly complex world of computers or the internet should try here. NOT FOR REPORTING ISSUES WITH PPRuNe FORUMS! Please use the subforum "PPRuNe Problems or Queries."

Linux Corner

Thread Tools
 
Search this Thread
 
Old 22nd Oct 2010, 09:07
  #381 (permalink)  
 
Join Date: May 2001
Posts: 10,815
Likes: 0
Received 0 Likes on 0 Posts
Found it.

Linked to oracle client installations. You need to have an account on the machine and access to it.

Fix has aready been pushed.
mad_jock is offline  
Old 22nd Oct 2010, 09:28
  #382 (permalink)  
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
BREAKING NEWS: The Pope is catholic.

Honestly BOAC.

I've said it once and I've said it again.

Software is written by human beings.

The more lines of code in a piece of software, the greater the risk of bugs in the code.

More complex pieces of software have a great number of interdependencies with other software written by other people (crypto libraries etc.).

Mac, Linux, Windows .... even the infamous OpenBSD. Only an idiot would claim their software to be invincible, as time and time again, it's proven that it's not a case of if.... but when.

What differentiates the software developers is not whether there are bugs in their code, but the overall quality of their code......how many bugs are found, the seriousness of the bugs, and how the bugs are dealt with etc. etc.
mixture is offline  
Old 22nd Oct 2010, 10:31
  #383 (permalink)  
Per Ardua ad Astraeus
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
Mixture - may I suggest you stop reading? Your news on the Pope is timely, however.
BOAC is offline  
Old 22nd Oct 2010, 11:33
  #384 (permalink)  
 
Join Date: May 2001
Posts: 10,815
Likes: 0
Received 0 Likes on 0 Posts
BOAC the simple difference between this "security breach" and the microsoft ones is that the linux/unix ones are usually found by pro security firms. And its is very rare they are in the core kernal. They also tend to be package specific as in this case. Its not actually the linux kernal that has the security hole its a third party add on for oracle clients.
mad_jock is offline  
Old 22nd Oct 2010, 13:14
  #385 (permalink)  
Per Ardua ad Astraeus
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
m j - according to my info the flaw IS in the Linux kernel and was introduced in version 2.6.30. The fix is at http://www.vsecurity.com/download/to...-rds-exploit.c. We may be looking at different things? This is the second recent kernel 'error' by the writers following September's.
BOAC is offline  
Old 22nd Oct 2010, 13:58
  #386 (permalink)  
 
Join Date: May 2001
Posts: 10,815
Likes: 0
Received 0 Likes on 0 Posts
Its in a protocol layer of RDS which is a data package protocol for operating databases eg Oracle. You have to be on the local machine with a local account to be able to use it. ie you the user have to want to get into your own machine. Any self respecting linux user would know if you want to zero the root passwd and have access all you have to do is boot via a liveOS and zero the root passwd in the passwd file. Its only really an issue if you have a work machine aka your a dealer on the stock exchange. Even if you do get the local admin rights you still have no access to the servers.

For this to be able to work the RDS services has to be up, in 99% of the linux machines it won't be turned on.

The second flaw was part of the GNU C. libarys. And I might add as well there is no way I would ever open that link of yours. Its a C script that will screw every type of OS if it has something nasty inside it.

Which again is the main issue with nastys, users clicking on things that they don't have a clue what they do. Call it security_update.doc.c. most folk won't spot the c. on the end click on it and trigger the script.
mad_jock is offline  
Old 22nd Oct 2010, 15:19
  #387 (permalink)  
Per Ardua ad Astraeus
 
Join Date: Mar 2000
Location: UK
Posts: 18,579
Likes: 0
Received 0 Likes on 0 Posts
MJ - to ease your concerns over whatever a 'c' is, you can visit VSR Security Advisories (no 'c')
BOAC is offline  
Old 22nd Oct 2010, 16:01
  #388 (permalink)  
 
Join Date: May 2001
Posts: 10,815
Likes: 0
Received 0 Likes on 0 Posts
C is a programing language.

And yes that is the "security flaw" which I was on about.
mad_jock is offline  
Old 22nd Oct 2010, 16:53
  #389 (permalink)  
bnt
 
Join Date: Feb 2007
Location: Dublin, Ireland. (No, I just live here.)
Posts: 733
Received 6 Likes on 5 Posts
Of course any computer is vulnerable if you have direct local access to it, or if you're silly about passwords. The book The Cuckoo's Egg documents various hack attacks on UNIX that took place in 1986, in which secure military systems were brought down by "human factors", such as weak passwords and "social engineering" (i.e. call someone up and ask for the password). There were also remote attacks such as the Morris worm, which exploited some known bugs in UNIX processes. When we talk about systems being vulnerable these days, we hope that people and designers have learned from these and other past vulnerabilities and closed them off, but of course it's not guaranteed.

One main difference between UNIX and Windows systems, in the past, has been that you had Windows users running with administrative privileges at all times, while the "root" user on a UNIX system was clearly defined as "only when you have to". You could log in as root and do work, but if you read any books or received any training, you were left in no doubt that that was a Bad Thing. If you're running e.g. a web browser, it should be running under your limited permissions, why would it need anything more? Normal UNIX users had no choice in the matter - permissions were enforced by the sysadmin.

Which wasn't a problem at first, since UNIX systems were always designed to be run by a trained sysadmin, but if you're going to roll out UNIX (Linux, Mac OS X, etc.) to users who are not sysadmins, you have to give them a way in, which led to the "su" or "sudo" method. This gives you temporary root permissions using your own password, not a root password. You launch an application with "sudo" do what you have to do, and close the app. If any application were to try that, you get asked about it - is it necessary? If that sounds like what Microsoft has been doing with Vista and W7, it's not a coincidence.
bnt is offline  
Old 30th Oct 2010, 21:53
  #390 (permalink)  
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
BOAC

Mixture - may I suggest you stop reading?
May I in return suggest you reconsider scaremongering type headlines that a journo would use..... "Linux IS vulnerable" ....

Anyhow, no I won't "stop reading".... I'm off to read a book. Thank you very much.
mixture is offline  
Old 30th Oct 2010, 21:56
  #391 (permalink)  
 
Join Date: Aug 2002
Location: Earth
Posts: 3,663
Likes: 0
Received 0 Likes on 0 Posts
bnt,

This gives you temporary root permissions using your own password, not a root password. You launch an application with "sudo" do what you have to do, and close the app
Ah yes... the joys of "sudo su" ....
mixture is offline  
Old 30th Oct 2010, 23:49
  #392 (permalink)  
 
Join Date: Jan 2008
Location: Bracknell, Berks, UK
Age: 52
Posts: 1,133
Likes: 0
Received 0 Likes on 0 Posts
Originally Posted by mixture
Ah yes... the joys of "sudo su" ....
Linux...the Phil Collins of the IT world
Mike-Bracknell is offline  
Old 31st Oct 2010, 01:22
  #393 (permalink)  
Hippopotomonstrosesquipidelian title
 
Join Date: Oct 2006
Location: is everything
Posts: 1,826
Likes: 0
Received 0 Likes on 0 Posts
Obligatory sudo reference: xkcd: Sandwich
Bushfiva is offline  
Old 31st Oct 2010, 20:12
  #394 (permalink)  
Upto The Buffers
 
Join Date: Apr 2006
Location: Leeds/Bradford
Age: 48
Posts: 1,112
Likes: 0
Received 0 Likes on 0 Posts
Linux...the Phil Collins of the IT world
So Windows must be Benny Hill, right?
Shunter is offline  
Old 1st Nov 2010, 04:28
  #395 (permalink)  
 
Join Date: Jun 2009
Location: Canada
Posts: 464
Likes: 0
Received 0 Likes on 0 Posts
Originally Posted by mad_jock
BOAC the simple difference between this "security breach" and the microsoft ones is that the linux/unix ones are usually found by pro security firms. And its is very rare they are in the core kernal. They also tend to be package specific as in this case.
The other difference is that 'Linux security hole' stories tend to hit the media two days _after_ my Linux machines have downloaded the updates which fix them. Normally when I see one of these stories I think 'oh, so that's why I got a new kernel on Monday', whereas when I used to run Windows I had to think 'Oh God, how long are they going to take to fix this one?'

That is, of course, still the situation with Flash bugs (nearly two weeks before they fix the latest critical exploit), but with Apparmor on Linux at least I can trivially sandbox Flash so that it literally cannot do anything bad to the OS because the kernel blocks it.
MG23 is offline  
Old 15th Nov 2010, 15:35
  #396 (permalink)  
 
Join Date: Jul 2007
Location: Bristol
Age: 67
Posts: 22
Likes: 0
Received 0 Likes on 0 Posts
Really Stuffed Now

I can't work out what is causing this problem, but over time the entire data disk fills up. Twice I have recovered the machine to a useable state by locating and deleting large directories, but this time I was too late and the machine has stuffed itself and now refuses to let me login.

I need to establish what the cause is, as there is clearly something amiss - and it isn't log files - they would never fill hundreds of Gbs in a number of weeks. Most importantly, however, I need to regain control of the server so that we can have our files back.

I can gain access to the machine using a live disk (SuSe, or Knoppix), but they refuse to let me create a RAID using the existing pair of data disks; they want to format the disks, which clearly I don't want to do. A possibility is to disconnect the 2 data disks and reboot onto the OS disk, reset the partition tables, reboot and try to remount the data disks, but I am anxious that I risk losing my data. Thoughts anyone?

And yes, the backup is fairly recent, but not that recent!
N727NC is offline  
Old 15th Nov 2010, 15:46
  #397 (permalink)  
 
Join Date: Jan 2008
Location: Bracknell, Berks, UK
Age: 52
Posts: 1,133
Likes: 0
Received 0 Likes on 0 Posts
Boot with Knoppix or whatever, take the data onto a separate USB drive, then blow away the server and reinstall so that you know how it's configured. Terabyte disks are relatively cheap these days, so ~£100 would get you a pair which you can RAID (assuming it's a SATA array rather than SAS?)
Mike-Bracknell is offline  
Old 15th Nov 2010, 17:31
  #398 (permalink)  
 
Join Date: Jul 2007
Location: Bristol
Age: 67
Posts: 22
Likes: 0
Received 0 Likes on 0 Posts
MB - Thanks for your thoughts, but I wish it were that simple. If I boot off a Live Disk, the partitioner recognizes the 2 disks as part of a RAID 1, but won't let me mount the RAID, saying that it cannot mount an unknown type of disk.

Is there a trick that I have missed?
N727NC is offline  
Old 15th Nov 2010, 23:11
  #399 (permalink)  
 
Join Date: Jan 2008
Location: Bracknell, Berks, UK
Age: 52
Posts: 1,133
Likes: 0
Received 0 Likes on 0 Posts
Originally Posted by N727NC
MB - Thanks for your thoughts, but I wish it were that simple. If I boot off a Live Disk, the partitioner recognizes the 2 disks as part of a RAID 1, but won't let me mount the RAID, saying that it cannot mount an unknown type of disk.

Is there a trick that I have missed?
RAID1 is a mirror of 2 disks with identical information on both.

Break the mirror and mount an individual disk (if you can)?
Mike-Bracknell is offline  
Old 16th Nov 2010, 03:55
  #400 (permalink)  
 
Join Date: Jun 2009
Location: Canada
Posts: 464
Likes: 0
Received 0 Likes on 0 Posts
What directories did you have to delete? I believe the / partition on my home server is about 16GB and I've never had this kind of problem.
MG23 is offline  


Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service

Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.