Hi,
just like all version of 8.01 that I can download from Operas ftp server,
the SuSE packages segfault on my SuSE 9.0. Other people seem to have
the same problem with SuSE 9.0, look here:
http://groups.google.com/groups?hl=de&lr=&threadm=20050622193542.6e210a55.l…
Anyone running 8.01 successfully on SuSE 9.0?
cu,
Frank
--
Dipl.-Inform. Frank Steiner Web: http://www.bio.ifi.lmu.de/~steiner/
Lehrstuhl f. Bioinformatik Mail: http://www.bio.ifi.lmu.de/~steiner/m/
LMU, Amalienstr. 17 Phone: +49 89 2180-4049
80333 Muenchen, Germany Fax: +49 89 2180-99-4049
* Rekursion kann man erst verstehen, wenn man Rekursion verstanden hat. *
Hi list,
just tried to use fresh installed Suse 9.3 updated with you.
SuSEfirewall2-3.3-18.2
/etc/sysconfig/SuSEfirewall2
with FW_ALLOW_INCOMING_HIGHPORTS_UDP="yes"
Start FW complains, four lines
"iptables: No chain/target/match by that name"
Reasons are in /sbin/SuSEfirewall
lines 1460 and 1469:
for CHAIN in $input_zones; do
--> chain=input_$chain
should be "CHAIN=input_$CHAIN".
Frank Stuehmer
-----BEGIN PGP SIGNED MESSAGE-----
- -------------------------------------------------------------------------
Wed Jun 29 17:00:00 MEST 2005
Dear suse-security-announce subscribers and SUSE LINUX users,
With the release of the SUSE Linux 9.3 FTP edition this week, SUSE Security
announces that the SUSE Linux 8.2 version of our home user product will
be discontinued soon. Having provided security-relevant fixes for more
than two years, vulnerabilities found in SUSE Linux 8.2 after
July 14th 2005 will not be fixed any more for this product.
As a consequence, the SUSE Linux 8.2 distribution directory on our ftp
server ftp.suse.com has been moved from /pub/suse/i386/8.2/ to the
/pub/suse/discontinued/ directory tree structure to free space on our
mirror sites for the SUSE Linux 9.3 FTP edition; the 8.2 directory in the
update tree /pub/suse/i386/update/8.2 will follow later in July
2005, as soon as all updates have been published.
The discontinuation of SUSE Linux 8.2 enables us to focus on the SUSE
LINUX distributions of a newer release date to ensure that our customers
can continuously take advantage of the quality that they are used to with
SUSE LINUX products.
This announcement holds true for SUSE Linux 8.2 only. As usual, SUSE will
continue to provide update packages for the following home users
distributions:
SUSE LINUX 9.0
SUSE LINUX 9.1
SUSE LINUX 9.2
and
SUSE LINUX 9.3
for a two-year period after the release of the respective distribution.
Please note that the maintenance cycles of SUSE LINUX Enterprise Server
products and products based on the SUSE LINUX Enterprise Server operating
system are not affected by this announcement. To learn more about SUSE
LINUX business products, please visit http://www.novell.com/linux/suse/.
If you have any questions regarding this announcement, please do
not hesitate to contact SUSE Security at <security(a)suse.de>.
Best regards,
Roman Drahtmüller,
SUSE Security.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iQEVAwUBQsK7yney5gA9JdPZAQGZ4Af/aXyoJzrkoiIe8PkysAlAbjCmbQWHnNWJ
eLpk5xgtu/TTX2/zT6LrSg6t1uV4bgxg/x5026CShTXLJRpjMgRrlfZCZpSMUW3o
DB5kLs2SSWWV8Ep7L2faiU5yMf4CD1LZ4HWq9wNxk/1vpbDilZL5Ni713D8r/Mcv
WE5r3amyU0TkXO2peYNj4z8lk2rwiaJFUwMZzG6MRCn1CtgDXCIdwqe1gPn0tpdq
r3tkRpLJrQltpPHcjO3N6MXo8OUlzThg4nm+C5WY0tbSn5eDo+DYdWH2s03fp20W
M/9IKaoxACOtpgJhuljxA8OVtJ/7ybNaTfKquvfhMaoUuTiZtcBENA==
=rNzC
-----END PGP SIGNATURE-----
Hi,
FYI I've put the SuSEfirewall2 subversion repository on
http://forge.novell.com/modules/xfmod/project/?susefirewall2
So if you are interested in SuSEfirewall2 development feel free to
try the latest and greatest. Feedback and useful patches are welcome
of course.
cu
Ludwig
--
(o_ Ludwig Nussel
//\ SUSE LINUX Products GmbH, Development
V_/_ http://www.suse.de/
Hi there,
I admit that perhaps it isn't 100% the list for my issue but
it's related with the update, thus the security impovement procedure.
By mistake I had selected to my freshly installed 9.3 Suse Pro,
to download the old OpenOffice among other things. When I realised
that it's going to download the whole earlier version, I stopped
that download and everything which had been fetched before open office,
had been updated, ok.
There after I had tried to run the update process once again, to fetch
the remaining security updates, without selecting the OpenOffice again.
But what ever I had tried, I can't prevent yast from resuming OpenOffice's
download. It simply starts again, as something (a temp file?) had broken
and needs to be deleted or edited by hand ...
Any help to remove the scrap of the previous downnload for having a
properly updated system would be appreciated.
Nicholas
BTW: My localization settings are set to Greek, I don't think it's there
the problem, but I suppose I 'd have to mention it.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The Wednesday 2005-06-22 at 17:05 +0200, Marcus Meissner wrote:
> 1) Problem Description and Brief Discussion
>
> The anti spam tool SpamAssassin was prone to a denial-of-service
> attack. A remote attacker could craft a MIME E-Mail message that
> would waste a lot of CPU cycles parsing the Content-Type header.
>
> This is tracked by the Mitre CVE ID CAN-2005-1266.
>
> Only SUSE Linux 9.2 and 9.3 are affected, since they include the 3.x
> version of spamassassin. Older versions are not affected.
I noticed that you have upgraded to 3.0.4, and thus save me that work of
manually upgrade. Thanks. But the scoring of this release (and 3.0.3 as
well) is wrong:
score BAYES_60 0 0 3.515 1.0
score BAYES_80 0 0 3.608 2.0 <----
score BAYES_95 0 0 3.514 3.0
score BAYES_99 0 0 4.070 3.5
Notice that the score for 80% is bigger than for 95%, for Bayes and no
network tests, ie, 3.608 > 3.514
I noticed this because I manually edit bayes_99 to be 4.99 - but can I
trust there is no other error in the scoring?
I suggest that somebody with influence (ie, from SuSE) suggests the
developers to add some automatic tests that impede this kind of
congruences creeping in.
- --
Cheers,
Carlos Robinson
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)
Comment: Made with pgp4pine 1.76
iD8DBQFCupMqtTMYHG2NR9URAgGyAJ0bLG0okVs/lE8iEKWYiA+b8CVnjACeJQQQ
GF439GHuAV7jGcf3j+T3U0k=
=xN0k
-----END PGP SIGNATURE-----
Hi,
i am planning to build a mail server for 30 users with suse linux but i don't kown what imap server to use ( cyrus - courier - dovecot - etc.. ).
I read that dovecot is the better choise for security.
My users must manage large mailbox ( from 100M to 1G ) but in this case i read that is cyrus the correct choise.
What do you think?
Best regards,
Cristian Del Carlo
Hi,
will OpenSSL version 0.9.7g be available as a RPM for SuSE 9.1? YOU
currently holds openssl-0.9.7d-15.13, and the OpenSSL team has fixed
some important bugs since then.
--
Mit freundlichen Grüßen / Sincerely
Dipl. Inform. Ralph Seichter
Hallo,
gegeben: Linux Server mit Suse 9.0 als Server für alles (Mail/News/www/ etc.)
und gleichzeitig auch masq. Router.
Was ich erreichen möchte: Der Dienst imap (143) soll von internen Hosts unter
dieser Portnummer erreichbar sein. Aus Richtung des Internet möchte ich
diesen Port aber nicht freigeben sondern einen (beliebigen) anderen Port >
1024 wählen. Unter FW_SERVICES_TCP_EXT habe ich die 143 also nicht
eingetragen. Stattdessen habe ich unter FW_FORW_MASQ einen Eintrag
0/0,192.168.9.1,tcp,9143,143.
Bei einem Versuch den Port 9143 zu kontaktieren bekomme ich dann im Log
folgende Meldung: SuSE-FW-ILLEGAL-TARGET IN=ppp0 OUT= MAC= SRC=217.7.147.254
DST=192.168.9.1 LEN=60 TOS=0x10 PREC=0x00 TTL=58 ID=41252 DF PROTO=TCP
SPT=52143 DPT=143
Funktioniert also leider nicht wie gedacht. Welchen Trick muß ich anwenden um
das gewünschte zu erreichen.
Mfg Jörg
Subject is the question.
I have been trying to use the ipt_recent module, but if i insert rules in
/etc/sysconfig/scripts/SuSEfirewall-custom it does not work.
Problem is possibly the order in which rules are processed, I guess
iptables does not reach my rules and has accepted traffic before hitting
them.
I tried putting my rules in all locations in the -custom file, to no avail.
--
L. de Braal
BraHa Systems
NL - Terneuzen
T +31 115 649333
F +31 115 649444