<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>openSUSE &#8211; Phocean.net</title>
	<atom:link href="/tag/opensuse/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Computer Security Blog</description>
	<lastBuildDate>Fri, 24 Feb 2017 21:17:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.10</generator>
	<item>
		<title>Dovecot LDA vs Procmail</title>
		<link>/2009/12/09/dovecot-lda-vs-procmail.html</link>
		<comments>/2009/12/09/dovecot-lda-vs-procmail.html#comments</comments>
		<pubDate>Wed, 09 Dec 2009 01:10:17 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Amavis]]></category>
		<category><![CDATA[Dovecot]]></category>
		<category><![CDATA[IMAP]]></category>
		<category><![CDATA[mta]]></category>
		<category><![CDATA[openSUSE]]></category>
		<category><![CDATA[Postifx]]></category>
		<category><![CDATA[SMTP]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Spamassassin]]></category>
		<category><![CDATA[umask]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=542</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=542</guid>
		<description><![CDATA[I have a mail server configuration based on Postfix for the smtp, Dovecot for the imap and virtual users receiving e-mails in maildir boxes. I am also using Amavis and Spamassassin for content filtering. I am not going now to describe this configuration, I think there are already a lot of very good tutorials about...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/12/09/dovecot-lda-vs-procmail.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>I have a mail server configuration based on <strong>Postfix</strong> for the smtp, <strong>Dovecot</strong> for the imap and virtual users receiving e-mails in maildir boxes.</p>
<p>I am also using <strong>Amavis</strong> and <strong>Spamassassin</strong> for content filtering.</p>
<p>I am not going now to describe this configuration, I think there are already a lot of very good tutorials about it all over the web. Moreover, the openSUSE maintainers made such a configuration quite easy : a sensible part of the work just consists in commenting out some line in the configuration files.</p>
<p>However, with the basic setup, I had an issue with permissions :  all e-mails delivered by Postfix were created with permissions set to 600.</p>
<p>A typical use case with which I got into trouble was spam learning, done with a cron script with a dedicated account (&#8220;vscan&#8221;, you don&#8217;t want to execute such a script with root, right ?).</p>
<p>In that case, what I need is files to be created with permissions 660.</p>
<p>It seems easy and rather obvious at first, but actually there is not such a setting in Postfix.</p>
<p>Actually, it is not really the job of the MTA to do it, so in the case of Postfix it doesn&#8217;t bother with the transmission of such a parameter.<br />
Then, I tried to use Procmail and set UMASK in <strong>/etc/procmailrc</strong>, but this just didn&#8217;t have any effect.</p>
<p>After searching and trying in vain a couple of hours, I found out that Dovecot can also deliver e-mails from the MTA to the maildir with Dovecot LDA.</p>
<p>So I tested it out. The configuration is pretty straightforward.</p>
<p>Add the line in bold to the virtual user configuration in <strong>/etc/postfix/main.cf</strong> :</p>
<pre>[...]
virtual_mailbox_domains = domain.com
virtual_mailbox_maps = hash:/etc/postfix/vmailbox
virtual_mailbox_base = /home/vmail
virtual_minimum_uid = 100
virtual_gid_maps = static:1002
virtual_uid_maps = static:1001
virtual_transport = dovecot
[...]</pre>
<p>Now, add these lines in <strong>/etc/postfix/master.cf</strong> :</p>
<pre>[...]
# Dovecot LDA
dovecot   unix  -       n       n       -       -       pipe
   flags=DRhu user=vmail argv=/usr/lib/dovecot/deliver -d ${recipient}
[...]</pre>
<p>Finally, configure <strong>/etc/dovecot/dovecot.conf</strong> with these sections :</p>
<pre>[...]
protocol lda {
  # If you wish to use plugins you need to specify plugin directory
  # For example quota enforcing is implemented by plugin
  module_dir = /usr/lib/dovecot/modules/lda
  # Address from LDA should send MDNs like out of quota
  postmaster_address = postmaster@domain.com
  # UNIX socket path to master authentication server to find users.
  auth_socket_path = /var/run/dovecot/auth-master
}
[...]
auth default {
[...]
  socket listen {
	master {
		# Master socket provides access to userdb information. It's typically
		# used to give Dovecot's local delivery agent access to userdb so it
		# can find mailbox locations.
	      	path = /var/run/dovecot/auth-master
      		mode = 0660
		user = vmail
		group = vmail
	}
	client {
		# The client socket is generally safe to export to everyone. Typical use
		# is to export it to your SMTP server so it can do SMTP AUTH lookups
		# using it.
		path = /var/run/dovecot/auth-client
		mode = 0660
	}
  }
}
[...]</pre>
<p>And that&#8217;s all !<br />
Restart Postfix and Dovecot, check the log to ensure that everything works fine.<br />
Now all new mails should come out in the maildir folder with permissions set to 660.</p>
<p>Definitely, in my opinion, Dovecot LDA is the way to go : simple and extensible. Good bye Procmail and your cluttered configuration file.</p>
]]></content:encoded>
			<wfw:commentRss>/2009/12/09/dovecot-lda-vs-procmail.html/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>OpenSSL : CVE-2009-3555 security fix and mod_ssl client authentication breakage</title>
		<link>/2009/11/28/openssl-cve-2009-3555-security-fix-and-mod_ssl-client-authentication-breakage.html</link>
		<comments>/2009/11/28/openssl-cve-2009-3555-security-fix-and-mod_ssl-client-authentication-breakage.html#comments</comments>
		<pubDate>Sat, 28 Nov 2009 16:08:50 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Apache]]></category>
		<category><![CDATA[Debian]]></category>
		<category><![CDATA[openSUSE]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[Vulnerability]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=524</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=524</guid>
		<description><![CDATA[A security advisory on OpenSSL has recently been published. Details are there and there. It is vulnerable to a MiTM attack where the attacker can intercept and retrieve the credential to a trusted HTTPS website, by intercepting the session cookie sent back to the client. A proof of concept of an attack against Twitter was...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/11/28/openssl-cve-2009-3555-security-fix-and-mod_ssl-client-authentication-breakage.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>A security advisory on OpenSSL has recently been published. Details are <a title="CVE-2009-3555" href="http://secunia.com/advisories/cve_reference/CVE-2009-3555/">there</a> and <a title="renegociation vulnerability" href="http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html">there</a>.</p>
<p>It is vulnerable to a <strong>MiTM attack </strong>where the attacker can intercept and retrieve the credential to a trusted HTTPS website, by intercepting the session cookie sent back to the client.</p>
<p>A proof of concept of an attack against Twitter was made.</p>
<p>Fine. But so far, <strong>the answer was to just disable any renegociation</strong>.</p>
<p>This actually causes some issues with SSL session timeout and totally broke client authentication.</p>
<p>I got into problems because of the latter. I am using client authentication for some location of my web server, and I recently could not connect anymore to these with the following log in apache :</p>
<pre>[Tue Nov 24 16:56:15 2009] [debug] ssl_engine_kernel.c(1912): OpenSSL:Exit: error in SSLv3 read client hello A
[Tue Nov 24 16:56:15 2009] [error] [client x.x.x.x] Re-negotiation handshake failed: Not accepted by client!?</pre>
<p>I first was not aware of the openssl patch and tried almost anything possible. My focus was, of course, on the certificate and the client.<br />
But, a nice guy on IRC #suse,<strong> Stittel</strong>, had a good hunch and suggested me to look at the CVE-2009-3555 fix.</p>
<p>After more tests, it was quickly confirmed to work well with older versions of OpenSSL (as shipped in Debian Lenny).<br />
Finally, I downgraded the OpenSSL version on my openSUSE box to a version prior to the CVE-2009-3555 fix and it just worked fine.</p>
<p>Then, I dig into it and found a lot of interesting reports <a href="https://bugzilla.redhat.com/show_bug.cgi?id=533125" target="_blank">there</a> and <a href="http://old.nabble.com/TLS-renegotiation-disabling-:-mod_ssl-and-OpenSSL--0.9.8l-td26285568.html" target="_blank">there</a>. So far it is a real mess.<br />
In short, the breakage will stay as long as browsers don&#8217;t also include a patch to avoid renegotiation.<br />
So far, I could not find a browser that does include a patch.<br />
If anyone reading it knows a version that does it, please let me know.</p>
<p>Meanwhile, you have actually the choice between :</p>
<ul>
<li>low security by deactivating client authentication on your server</li>
<li>low security by keeping a vulnerable version of OpenSSL</li>
</ul>
<p>As my server is not very exposed, I chose the latter, but that&#8217;s not satisfying.  It is not recommended, but if like me you need to use client authentication with mod_ssl on openSUSE 11.2, do :</p>
<pre>% zypper install --from repo-oss openssl openssl-certs libopenssl0_9_8 libopenssl0_9_8-32bit</pre>
<p>where repo-oss is the alias to the 11.2 release (without updates) on your system.</p>
<p>What a brutal way to fix an issues without much notification and consideration to the users ! Even the log message is wrong and just confusing the administrator&#8230;</p>
<p><em>PS 1 : thanks again to Stittel for the good hint (I hope you will come by here) and to the always nice and helpful #suse channel in general ;)</em></p>
<p><em>PS 2 : <a href="https://bugzilla.novell.com/show_bug.cgi?id=558176" target="_blank">bug reported</a> on openSUSE bugzilla</em></p>
]]></content:encoded>
			<wfw:commentRss>/2009/11/28/openssl-cve-2009-3555-security-fix-and-mod_ssl-client-authentication-breakage.html/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>openSUSE 11.1 and /boot on RAID 1</title>
		<link>/2009/10/21/opensuse-11-1-and-boot-on-raid-1.html</link>
		<comments>/2009/10/21/opensuse-11-1-and-boot-on-raid-1.html#comments</comments>
		<pubDate>Wed, 21 Oct 2009 18:06:27 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Debian]]></category>
		<category><![CDATA[Fedora]]></category>
		<category><![CDATA[Grub]]></category>
		<category><![CDATA[openSUSE]]></category>
		<category><![CDATA[RAID]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=489</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=489</guid>
		<description><![CDATA[I tried yesterday to set up a home server with two disks in a RAID 1 array. My intention was to have everything on the RAID volume, including /boot, so that if a disk crash, I still can boot on the second one. That&#8217;s the way I think it should work anyway, despite the number...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/10/21/opensuse-11-1-and-boot-on-raid-1.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>I tried yesterday to set up a home server with two disks in a RAID 1 array.</p>
<p>My intention was to have everything on the RAID volume, including /boot, so that if a disk crash, I still can boot on the second one.<br />
That&#8217;s the way I think it should work anyway, despite the number of tutorials or forum posts advising not to do so.</p>
<p>The openSUSE partitionner, during the installation process, warned me that having /boot on the RAID 1 array may not work with grub.<br />
And indeed, at the end of the installation, I could not be able to set grub properly :</p>
<ul>
<li>the installer seemed to be lost, writing wrong devices in the various grub config file like menu.lst and grub.conf</li>
<li>I tried to use the manual edition mode offered by the installer, but either because I missed something or there is a bug somewhere, I could never save my modifications.</li>
</ul>
<p>Conclusion : there was a no go.</p>
<p>I became curious to see how a few other distributions could handle it.</p>
<p>At first, I thought they would all fail, because I have always found the openSUSE installer to be the best out there.</p>
<p>So I took a <strong>Debian Lenny</strong> CD, which is my second favorite distribution, and looked at it. The Debian installer is straightforward, but the partionner has always lacked of flexibility. It is fine when you are doing something pretty standard, but you get quickly limited when you want to do something more complicated.<br />
There, no way to have /boot on a RAID volume, and the interface was really painful to use. Any mistake almost oblige you for sure to restart all from scratch.</p>
<p>Then, I looked at <strong>Fedora 11</strong>&#8230; without expecting much. The last time I tried it on a machine, it just froze every time it read the disk configuration.<br />
<strong>But&#8230; surprise ! All I wanted was supported out of the box</strong>. The partionner was as pleasant to use as the one of openSUSE, and setting grub on /dev/md0 was just a matter of checking a box.</p>
<p>I have been quite impressed this time and Fedora will stay on this machine for a while.</p>
<p>I haven&#8217;t tested <strong>openSUSE 11.2</strong> yet because the purpose of this machine is to be a server, so I care about stability.</p>
<p>But I will, and I wish it can support this feature also, or that it will be the case some day.</p>
]]></content:encoded>
			<wfw:commentRss>/2009/10/21/opensuse-11-1-and-boot-on-raid-1.html/feed</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>Automatic backup when inserting a drive</title>
		<link>/2009/09/28/automatic-backup-when-inserting-a-drive.html</link>
		<comments>/2009/09/28/automatic-backup-when-inserting-a-drive.html#comments</comments>
		<pubDate>Mon, 28 Sep 2009 09:34:11 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Dev]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[hal]]></category>
		<category><![CDATA[openSUSE]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[udev]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=419</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=419</guid>
		<description><![CDATA[I bought a 500 GB 2.5&#8243; external disk drive to backup the data of my laptop. It is small, quiet, easy to move and far enough for the important data I want to backup, mostly documents, e-mails or script from work. Being lazy, it happened that I did not backup my data. Yes, it is...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/09/28/automatic-backup-when-inserting-a-drive.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>I bought a 500 GB 2.5&#8243; external disk drive to backup the data of my laptop. It is small, quiet, easy to move and far enough for the important data I want to backup, mostly documents, e-mails or script from work.</p>
<p>Being lazy, it happened that I did not backup my data. Yes, it is a shame, but inserting a drive and launching the commands to rsync the discs was preventing me from this best practice.</p>
<p>So, I decided to make it automatic. The goal was that the only thing I would have to do would be to insert the drive, and then remove it when it is done.</p>
<p>Thanks to the magic of Gnu/Linux, it had been very easy. I will show below how I did it, thought they are many things that could be improved (but I haven&#8217;t felt the need so far).</p>
<h2><span style="text-decoration: underline;">Udev</span></h2>
<p><strong>Udev</strong> not only allows to create /dev entries dynamically, but offers a lot of triggers to perfom all kind of actions when some hardware is inserted.</p>
<p>The <strong><em>udevinfo</em></strong> command will show you a lot of output concerning your drive. What we want is a unique way to differenciate the backup drive from any other drive that will be inserted in the future.</p>
<p>What would be better than the manufacturer serial ?</p>
<p>So let&#8217;s look for it :</p>
<pre>$ udevinfo -a -p /sys/block/sdc | grep serial</pre>
<p><em><strong>*UPDATE 06/2011* </strong> It seems that on recent versions, the syntax of this command slightly changed into this :</em></p>
<pre>$ udevadm info -a -p /sys/block/sdc | grep serial</pre>
<p>Copy the serial.</p>
<p>Now we have to create a rule file, that will tell to udev what to do when this particular drive is inserted.</p>
<p>This is done in the <em><strong>/etc/udev/rules.d</strong></em> folder. Let&#8217;s create a file <em><strong>30-mnt.rules</strong></em> or anything you like.</p>
<p>We edit this file so that it contains :</p>
<pre>ACTION=="add",KERNEL=="sd*",SUBSYSTEMS=="usb", ATTRS{serial}=="57442D57584E3430394C5A38", RUN+="/home/jc/bin/backup/bckp-home.sh %k"</pre>
<p><em><strong>ACTION==&#8221;add&#8221;</strong></em> will tell udev that this action must be triggered when the drive is inserted.<br />
<em><strong>SUBSYSTEMS</strong></em> could be changed according to the drive you are using (scsi, usb, &#8230;).<br />
<em><strong>ATTRS{serial} </strong></em>must contain the serial you just grabbed.<br />
<em><strong>RUN+=&#8221;/path/to/bin/backup.sh %k&#8221;</strong></em> tells udev to launch the backup script. %k, which contains the device name, sdc, is passed as an argument.</p>
<p>Optionally, it is quite convenient, you may want to make a symlink to the <em><strong>/dev/sd?</strong></em> device, with :</p>
<pre>KERNEL=="sd*",SUBSYSTEMS=="scsi", ATTRS{model}=="GJ0250EAGSQ     ", SYMLINK+="ultrabay%n"</pre>
<h2><span style="text-decoration: underline;">The shell script</span></h2>
<p>Now, the script itself :</p>
<pre>#!/bin/sh
LOGFILE=/PATH/TO/bckp.log
echo "--- BCKP - INFO : \$1=_${1}_" &gt;&gt; $LOGFILE
[[ $1 ]] || { echo "ERROR : missing parameter"&gt;&gt;$LOGFILE; exit 1; }

# give time for the user, if needed to kill the process
sleep 6
MOUNT_PATH=$(grep $(echo $1) /etc/mtab | awk '{print $2}')
[[ $MOUNT_PATH ]] || {
  echo "ERROR fretching mount point"&gt;&gt;$LOGFILE;
  exit 1;
}
echo " Synchronizing $MOUNT_PATH)"&gt;&gt;$LOG

# add here all you rsync commands
rsync -av --delete /PATH/TO/DATA $MOUNT_PATH/backup/
...
exit 0</pre>
<h2><span style="text-decoration: underline;">Testing it</span></h2>
<p>Now, let&#8217;s reload udev :</p>
<pre>$ sudo udevadm control --reload-rules</pre>
<p>To test if it works :</p>
<pre>$ sudo udevadm trigger</pre>
<p>or maybe :</p>
<pre>$ /etc/init.d/boot.udev restart</pre>
<p>Plug off/in your drive, and the script should be executed as expected.</p>
<h2><span style="text-decoration: underline;">Optional : setting more options with Hal<strong><br />
</strong></span></h2>
<p>It is not necessary at all for the backup script to work, but it would be very practical to have  a fixed mount point for a drive.<br />
For instance, I use a second drive (in the untrabay slot of my thinkpad) that contains all my virtual machines.</p>
<p>The benefice is to prevent a performance drain of the system when many virtual machines are doing I/O like swapping or anything else.</p>
<p>Create a file like <strong><em>/etc/hal/fdi/policy/15-static-mount.fdi</em></strong>, containing :</p>
<pre>&lt;?xml version="1.0" encoding="ISO-8859-1"?&gt;
&lt;deviceinfo version="0.2"&gt;
  &lt;device&gt;
    &lt;match key="volume.uuid" string="aa0019ef-86e0-4011-b996-31ef3e7174c8"&gt;
      &lt;merge key="volume.policy.should_mount" type="bool"&gt;true&lt;/merge&gt;
      &lt;merge key="volume.fstype" type="string"&gt;ext4&lt;/merge&gt;
<span style="color: #ff0000;">      &lt;merge key="volume.policy.desired_mount_point" type="string"&gt;ultrabay&lt;/merge&gt;</span>
      &lt;merge key="volume.label" type="string"&gt;Fuji&lt;/merge&gt;
      &lt;merge key="volume.policy.mount_option.noatime" type="bool"&gt;true&lt;/merge&gt;
      &lt;merge key="volume.policy.mount_option.acl" type="bool"&gt;true&lt;/merge&gt;
    &lt;/match&gt;
  &lt;/device&gt;
&lt;/deviceinfo&gt;</pre>
<p>The drive is matched by it uuid. You can get the uuid of your disk with :</p>
<pre>$ ls -la /dev/disk/by-uuid/</pre>
<p>You can, if you want, set the volume label and specify several options of the file system.</p>
<p>However, the most interesting option is the &#8220;desired_mount_point&#8221; one which allow you to fix the mount point. In the example, the disk will always be mounted in </p>
<pre>/media/ultrabay</pre>
<p>, and not the system disk, or disk_1, etc.</p>
<h2><span style="text-decoration: underline;">Coming next</span> !</h2>
<p>That&#8217;s all for today folks. Let me know if there are some things not clear or that can be optimized.</p>
<p>Next time, we will see how to run the same script from <strong>Hal</strong> instead. We will also use Zenity to get a nice GUI prompt when the disk is inserted.</p>
]]></content:encoded>
			<wfw:commentRss>/2009/09/28/automatic-backup-when-inserting-a-drive.html/feed</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>How to activate music preview in Nautilus</title>
		<link>/2009/09/26/how-to-activate-music-preview-in-nautilus.html</link>
		<pubDate>Sat, 26 Sep 2009 03:21:32 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[mp3]]></category>
		<category><![CDATA[mpg123]]></category>
		<category><![CDATA[openSUSE]]></category>
		<category><![CDATA[zypper]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=418</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=418</guid>
		<description><![CDATA[It allows to play a music file by letting the cursor over it, without opening a player. Very easy to set up : $ zypper install mpg123 and it should work immediatly.]]></description>
				<content:encoded><![CDATA[<p>It allows to play a music file by letting the cursor over it, without opening a player.</p>
<p>Very easy to set up :</p>
<pre>$ zypper install mpg123</pre>
<p>and it should work immediatly.</p>
]]></content:encoded>
			</item>
		<item>
		<title>No Nessus gui client and limited support of the server for openSUSE</title>
		<link>/2009/09/02/no-nessus-gui-client-and-limited-support-of-the-server-for-opensuse.html</link>
		<comments>/2009/09/02/no-nessus-gui-client-and-limited-support-of-the-server-for-opensuse.html#comments</comments>
		<pubDate>Wed, 02 Sep 2009 13:27:36 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[nessus]]></category>
		<category><![CDATA[openSUSE]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=416</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=416</guid>
		<description><![CDATA[As I work on security, I used to use Nessus on my openSUSE system. But it seems that Tenable Network Security dropped support for the client on our favorite distribution. At least, for some reason, they stopped making an universal statically linked binary (though they keep doing it for the server part) and it hasn&#8217;t...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/09/02/no-nessus-gui-client-and-limited-support-of-the-server-for-opensuse.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>As I work on security, I used to use Nessus on my openSUSE system.</p>
<p>But it seems that <a href="https://discussions.nessus.org/message/2011#2011" target="_blank">Tenable Network Security dropped support for the client on our favorite distribution</a>.</p>
<p>At least, for some reason, they stopped making an universal statically linked binary (though they keep doing it for the server part) and it hasn&#8217;t changed since april.</p>
<p>Even the server has a rather limited and obsolete support of openSUSE 10, whereas Debian, Ubuntu and Fedora have support for various versions and architectures. Check <a href="http://nessus.org/download/nessus_download.php" target="_blank">there</a>.</p>
<p>This is rather a shame, as openSUSE is one of the major distribution.</p>
<p>I tried some workarounds like converting the deb packages, but, as expected, there are some dependancies issues.</p>
<p>So far, it seems that not many people are affected, because there are not many voices on the forum. I can live without it, but however, this is often a nice and useful tool.</p>
<p>Does anyone use it here ? Or did you get it to work somehow ? If you feel concerned, please let it know to Tenable !</p>
]]></content:encoded>
			<wfw:commentRss>/2009/09/02/no-nessus-gui-client-and-limited-support-of-the-server-for-opensuse.html/feed</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>openSUSE : default desktop going to be KDE, but&#8230;</title>
		<link>/2009/08/20/opensuse-default-desktop-going-to-be-kde-but.html</link>
		<comments>/2009/08/20/opensuse-default-desktop-going-to-be-kde-but.html#comments</comments>
		<pubDate>Thu, 20 Aug 2009 19:03:03 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Gnome]]></category>
		<category><![CDATA[kde]]></category>
		<category><![CDATA[openSUSE]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=411</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=411</guid>
		<description><![CDATA[What is this ? It is said that this change is useless and won&#8217;t make any difference. In a few words, you consider that the request was stupid. On that point, and also as a Gnome user, I agree. In that case, why would you change anything ? No one is going to be satisfied...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/08/20/opensuse-default-desktop-going-to-be-kde-but.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>What is <a href="http://www.kdedevelopers.org/node/4052" target="_blank">this</a> ?</p>
<p>It is said that this change is useless and won&#8217;t make any difference. In a few words, you consider that the request was stupid.<br />
On that point, and also as a Gnome user, I agree.</p>
<p>In that case, why would you change anything ?</p>
<p>No one is going to be satisfied with this. It is not a compromise, just nonsense.<br />
KDE users will be disappointed and Gnome users will feel marginalized.</p>
<p>The only thing that would have made sense were either following the request and focussing on KDE integration, or clearly reject it and leave things as they are.</p>
]]></content:encoded>
			<wfw:commentRss>/2009/08/20/opensuse-default-desktop-going-to-be-kde-but.html/feed</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>openSUSE kernel sources : patching against sock_sendpage() NULL Pointer Dereference vulnerability</title>
		<link>/2009/08/17/opensuse-kernel-sources-patching-against-sock_sendpage-null-pointer-dereference-vulnerability.html</link>
		<comments>/2009/08/17/opensuse-kernel-sources-patching-against-sock_sendpage-null-pointer-dereference-vulnerability.html#comments</comments>
		<pubDate>Mon, 17 Aug 2009 12:47:34 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[openSUSE]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[socket]]></category>
		<category><![CDATA[Vulnerability]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=405</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=405</guid>
		<description><![CDATA[I am using the 2.6.30 kernel sources from Kernel:linux-next and noticed that it has not yet been patched against the ’sock_sendpage()’ NULL Pointer Dereference vulnerability. The threat is serious as it could allow a local user to gain root privileges. Those who compile their own 2.6.x kernel should apply this patch (from Linus, check there...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/08/17/opensuse-kernel-sources-patching-against-sock_sendpage-null-pointer-dereference-vulnerability.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>I am using the 2.6.30 kernel sources from Kernel:linux-next and noticed that it has not yet been patched against the <a title="Null pointer deference" href="http://www.securitytracker.com/alerts/2009/Aug/1022732.html" target="_blank"><strong>’sock_sendpage()’ NULL Pointer Dereference</strong></a> vulnerability.</p>
<p>The threat is serious as it could allow a local user to gain root privileges.</p>
<p>Those who compile their own <strong>2.6.x kernel</strong> should apply <a href="/wp-content/uploads/2009/08/sock_sendpage.patch">this patch</a> (from Linus, check <a href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e694958388c50148389b0e9b9e9e8945cf0f1b98">there</a> for more info) .</p>
<p>Within your kernel source folder :</p>
<pre>$ patch -u -p0 &lt; sock_sendpage.patch</pre>
<p>I hope an official patch will be released soon for all kernels. I did not check if the 11.1 kernel has already been patched or not.</p>
]]></content:encoded>
			<wfw:commentRss>/2009/08/17/opensuse-kernel-sources-patching-against-sock_sendpage-null-pointer-dereference-vulnerability.html/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Yersinia : patch to compile under openSUSE (11.1)</title>
		<link>/2009/06/14/yersinia-patch-to-compile-under-opensuse-11-1.html</link>
		<comments>/2009/06/14/yersinia-patch-to-compile-under-opensuse-11-1.html#comments</comments>
		<pubDate>Sun, 14 Jun 2009 19:25:34 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Dev]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[compilation]]></category>
		<category><![CDATA[openSUSE]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[yersinia]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=391</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=391</guid>
		<description><![CDATA[Yet another post in the series of compilation failures due to unexpected libraries paths. This time, it is about Yersinia and the ncurses library. I made the following yersinia-opensuse11.1 patch which should work for openSUSE 11.1 and maybe other versions or distros.]]></description>
				<content:encoded><![CDATA[<p>Yet another post in the series of compilation failures due to unexpected libraries paths.</p>
<p>This time, it is about <a title="Yersinia" href="http://www.yersinia.net/" target="_blank">Yersinia</a> and the ncurses library. I made the following <a href="/wp-content/uploads/2009/06/yersinia-opensuse11.1.patch">yersinia-opensuse11.1 patch</a> which should work for openSUSE 11.1 and maybe other versions or distros.</p>
]]></content:encoded>
			<wfw:commentRss>/2009/06/14/yersinia-patch-to-compile-under-opensuse-11-1.html/feed</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Compilation of PackETH on openSUSE</title>
		<link>/2009/06/14/compilation-of-packeteth-on-opensuse.html</link>
		<pubDate>Sun, 14 Jun 2009 12:08:01 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Dev]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Ethernet]]></category>
		<category><![CDATA[forge]]></category>
		<category><![CDATA[openSUSE]]></category>
		<category><![CDATA[packETH]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=387</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=387</guid>
		<description><![CDATA[PackETH is a nice gkt tool to play with Ethernet packet. I encountered some path issues with the Makefile and openSUSE 11.1 64 bits to compile it, so here is the packETH-opensuse patch to compile correctly. If you are on a 32 bits system, all you will have to do is editing the CPPFLAGS line...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2009/06/14/compilation-of-packeteth-on-opensuse.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p><a title="PackETH" href="http://packeth.sourceforge.net/" target="_blank">PackETH</a> is a nice gkt tool to play with Ethernet packet.</p>
<p>I encountered some path issues with the Makefile and openSUSE 11.1 64 bits to compile it, so here is the <a href="/wp-content/uploads/2009/06/packETH-opensuse.patch">packETH-opensuse patch</a> to compile correctly.</p>
<p>If you are on a 32 bits system, all you will have to do is editing the <em>CPPFLAGS</em> line and replace all <em>lib64</em> occurences with<em> lib</em>.</p>
<p>I hope one will find it useful.</p>
]]></content:encoded>
			</item>
	</channel>
</rss>
