|
|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 01 Mar 2001 18:11:19 To : All Subject : URL: http://lwn.net/2001/0301/security.php3 --------------------------------------------------------------------------------
[1][LWN Logo]
[2]Click Here
[LWN.net]
Sections:
[3]Main page
Security
[4]Kernel
[5]Distributions
[6]On the Desktop
[7]Development
[8]Commerce
[9]Linux in the news
[10]Announcements
[11]Linux History
[12]Letters
[13]All in one big page
See also: [14]last week's Security page.
Security
News and Editorials
Vulnerability Reporting: Bugs in the bug reporting process (CORE-SDI).
[15]Volume 3, Issue 3 of Insight a newsletter from The Internet
Security Conference, contains a column by Ivan Arce, Founder and
Chairman of the Board of CORE-SDI, which discusses the problems in the
current ad-hoc process for reporting security vulnerabilities. The
column uses a detailed list of the steps possibly involved in a given
security report, then outlines many of the ways in which that process
can break down. Near the end, he recommends a simplified set of
guidelines:
The guidelines: A feeble attempt at improving the process
(1) Vulnerability reporting costs money: Keep it simple and
everybody wins.
All the involved parties (discoverer, proxy, vendor, trusted third
party, user) must invest a certain amount of effort to fix bugs.
All parties have finite resources and therefore it costs them
money. Streamlining the process and addressing the problems in a
responsible and timely fashion reduces the efforts for all parties.
(2) Communication is key.
The best way to streamline the process and ensure cooperation is to
maintain every party informed of what is going on. When that fails,
unilateral actions take place that could put all at risk.
(3) Minimize harm.
Conduct all activities bearing in mind that the end goal is to
improve the overall security and minimize the harm to all parties.
Although this sounds obvious, the ultimate goal can be obscured
during the process, evaluate your actions accordingly.
Extend the benefit of doubt, do not impute motives.
From here, though, he goes on to end with a recommendation to
"formalize and implement a vulnerability reporting process". That
opens many cans of worms, in terms of who is involved in "formalizing"
such a process and, once formalized, what are the penalties for
non-conformance? The "who" is mentioned at the beginning of the
article, which was inspired by discussions at SafeNet2000, an
invitation-only gathering sponsored by Microsoft that was held last
December. Apparently as a result of that gathering, work to formalize
the process is already underway. Neither the sponsor nor the
invitation-only nature of that gathering recommend it to us.
The article does a good job of showing why the ideal process of
reporting vulnerabilities will always be impacted by reality
(insufficient resources, poor vendor response, multiple discoverers,
active exploits, etc.), in short, why a formalized process will always
tend to break down. Add to that the danger of allowing a closed
(invitation-only) group to define, implement and potentially enforce a
formal process and it seems like we might end up exchanging one set of
problems for a less-appealing set.
Starting and ending with the simple guidelines suggested seems like a
better idea.
WEP: No weapon against hackers (ZDNet). You might assume that [16]this
latest ZDNet article on WEP was also talking about the cryptographic
issues with WEP, which have been mentioned in the last couple of
weeks. You'd be wrong. Instead, it looks at the issue of keeping
trespassers off of your wireless LAN. "Controlling access to wireless
networks is an increasingly difficult challenge for network
administrators. Unlimited access means that anyone with a wireless
network card could gain access to the network. On the other hand,
highly restricted access negates the benefits of going wireless and
annoys the users."
More SSH articles. For those still with stamina to handle more
editorial coverage of the SSH trademark issue, C|Net's Robert Lemos
has written an article entitled, "[17]Ssh! Don't use that trademark".
"'Regardless of its origins, the word has become the generic
description for this type of software,' said Michael Bednarek, an
intellectual property attorney at Washington, D.C.-based law firm Shaw
Pittman. 'As far as I can tell, there is no other name for it.'"
Security Reports
Security hole in Java may expose servers (News.com).
Sun has issued a warning that [18]a bug in Java Runtime Environments
for multiple platforms, including Linux, may allow an attacker to run
harmful programs on a server, though client systems running browsers
should be unaffected.
Linux-Mandrake security advisory for CUPS.
Linux-Mandrake has issues a [19]security advisory for the CUPS
printing packages. An internal audit found buffer overflow and
temporary file creation problems. It is highly recommended that all
Linux-Mandrake users upgrade to this new version of CUPS.
sudo buffer overflow.
A buffer overflow in Sudo, apparently discovered [20]by Chris Wilson,
has been fixed in the [21]just-released sudo 1.6.3p6.
* [22]Slackware
* [23]Trustix
* [24]Conectiva
* [25]Linux-Mandrake
* [26]Debian
* [27]Immunix
Zope security update.
Digital Creations has released [28]a security update to Zope (all
versions up to 2.3b1) fixing a security vulnerability in how ZClasses
are handled. An upgrade is recommended.
* [29]Red Hat
* [30]Linux-Mandrake
elm alternate folder buffer overflow.
A [31]buffer overflow in elm 2.5 PL3 was demonstrated this week. It
can be exploited by passing a long string in via the "-f" option. No
patch or updated version has yet been reported. Check BugTraq ID
[32]2403 for more details.
PHP-Nuke magic quotes vulnerability.
A [33]new vulnerability in PHP-Nuke was reported this week which can
allow any user to execute commands with the privileges of the PHP-Nuke
administrator. This occurs because magic_quotes_gpc is expected to be
enabled; if it is disabled, then information continues to be read even
after a NULL character is seen. An upgrade to PHP-Nuke 4.4.1 will fix
the problem. Note, however, that any PHP script that expects Magic
Quotes to be enabled could have this same problem. Here is a
[34]recommended tip to prevent such problems.
joe file handling vulnerability.
The configuration file for the joe editor, .joerc, is read first from
the current directory, if available, making it possible to [35]trick
users into executing commands if they edit/open a file in a directory
with a malicious .joerc file installed. No workaround/vendor solution
has been posted yet, though theoretically a patch should be fairly
easy to implement, by removing the check for the configuration file in
the local directory and restricting the file to the user's home
directory or the appropriate system directory.
An [36]informal report indicates that FreeBSD and NetBSD are
vulnerable to this, but that OpenBSD is not. No Linux-specific reports
have been posted.
Slackware IMAP exploit. A short note in the slackware-current
changelog commented that [37]all previous versions of imapd (which is
installed by default for Slackware distributions) had a remote exploit
problem. This was slightly puzzling to us, since we hadn't heard of a
new imapd vulnerability and Slackware [38]issued an update for imapd
in November that fixed the most recent vulnerability that we knew of.
Wednesday, though, an update to the Slackware Changelog cleared up the
confusion:
Tue Feb 27 15:31:05 PST 2001
n1/imapd.tgz: No, the package wasn't changed. But, there's an
update regarding the supposed imapd overflow. It was reported to us
that an exploit existed for the version of imapd previously used by
Slackware, but after obtaining a copy of the exploit from this
site: http://packetstorm.securify.com/0102-exploits/imapd_exploit.c
...we found it to be completely ineffective. Still, it never hurts
to keep daemons that provide network services as up-to-date as
possible, so if you're running imapd you should consider upgrading.
web scripts.
The following cgi-bin scripts were reported to contain
vulnerabilities:
* [39]Mailnews.cgi is reported to contain a user-supplied input
vulnerability, which can be exploited to remotely execute
arbitrary shell commands. No patch or vendor response has been
reported so far.
* [40]Adlibrary.pm, a perl-based package from Adcycle.com, is
reported to contain a vulnerability that can be exploited remotely
to execute arbitrary commands. This is due to insufficient
screening of user input. No patch or vendor response has been
reported so far.
Commercial products.
The following commercial products were reported to contain
vulnerabilities:
* [41]Marconi ASX-1000, a commercial ATM switch, is reported to
contain a vulnerability that can be used to disable remote
administration of the device (until it is power-cycled). No patch
or vendor response has been reported so far.
* [42]Cisco IOS Software contains an SNMP Read-Write ILMI Community
String vulnerability, which might make the device using the
software vulnerable to a denial-of-service attack. Cisco is
offering free updates to fix the problem.
* A second [43]Cisco IOS Software vulnerability report details
multiple vulnerabilities related to the unexpected creation and
exposure of SNMP community strings. They can be exploited to
permit unauthorized viewing or modification of devices. Specific
workarounds are provided, along with a table of related updates.
* [44]Chili!Soft responded to several recently discussed
vulnerabilities in Chili!Soft ASP. In some cases, workarounds are
offered; in others, it is promised that they will be addressed in
the next release.
* Shortly after the above Chili!Soft note was posted, Jim Sander
responded with yet an additional vulnerability, in which the
[45]Chili!Soft ASP license file, installed by default as a
world-readable and writable file, can be removed by any user,
causing the Chili!soft services to stop functioning.
* [46]The APC web/snmp management card, available as an option for
some APC products (power management), contains a potential
denial-of-service attack via a telnet connection to the card. APC
has responded by recommending that the APC product should be
firewalled to protect it from connections from outside the local
area network.
* The [47]Netscape Collabra Server has been reported to be
vulnerable to a denial-of-service attack via malicious packets
sent to the 119, 5238, 5239 and 20749 ports. Filtering those ports
is recommended; no vendor response has been seen so far.
Updates
Analog buffer overflow.
An exploitable buffer overflow in analog was reported in the
[48]February 22nd LWN Security Summary. Version 4.16 contains a fix
for the problem, which affects all earlier versions.
This week's updates:
* [49]Red Hat
Multiple vulnerabilities in bind 8.2.2 and bind 4.
Check the [50]February 1st LWN Security Summary for the initial
reports. Bind 8.2.3 contains fixes for the problems with 8.2.2. Bind 4
fixes are also available, but an upgrade to bind 8 or even bind 9 is
generally considered a preferable approach.
This week's updates:
* [51]Turbolinux
Previous updates:
* [52]Caldera Systems (February 1st)
* [53]Conectiva (February 1st)
* [54]Debian (February 1st)
* [55]Linux-Mandrake (February 1st)
* [56]Immunix (February 1st)
* [57]Red Hat (February 1st)
* [58]Slackware (February 1st)
* [59]SuSE (February 1st)
* [60]Trustix (February 1st)
* [61]Yellow Dog Linux (February 1st)
* [62]LinuxPPC (February 8th)
* [63]FreeBSD (February 8th)
* [64]Cobalt bind 8.2.3 (for the RaQ2 only) (February 8th)
* [65]Cobalt bind 4 (for the Qube1, RaQ1 and Qube2) (February 8th)
* [66]NetBSD (February 15th)
Sendmail 8.11.2 security fixes.
Check the [67]January 4th LWN Security Summary for the announcement of
the release of sendmail 8.11.2. It includes fixes for a number of
security issues found after 8.11.1 was released, including the
"sendmail -bt negative index bug" reported by Michal Zalewski in
October, 2000. Note that the exploitability of this bug was
questioned, but in any case, it has been fixed as of sendmail 8.11.2.
This week's updates:
* [68]Turbolinux
dump-0.4b15 local root access.
Check the [69]November 2nd LWN Security Summary for the original
report. This exploit only affects dump/restore if they are installed
setuid root. As of dump-0.4b18, dump and restore no longer require
setuid root. dump 0.4b20 was released in mid-November, 2000, with a
fix for this problem.
This week's updates:
* [70]Immunix
Previous updates:
* [71]Red Hat 5.x and 6.x (Red Hat 7.0 not vulnerable) (November
9th, 2000)
* [72]Linux-Mandrake (not vulnerable) (November 9th, 2000)
* [73]Trustix (November 9th, 2000)
* [74]Conectiva (not vulnerable) (November 9th, 2000)
* [75]Kondara (November 9th, 2000)
* [76]SuSE, not vulnerable (November 16th, 2000)
Format string vulnerabilities in PHP.
Check the [77]October 19th LWN Security Summary for the original
report. PHP 3.0.17 and 4.0.3 contain the fixes for these problems.
This week's updates:
* [78]Immunix
Previous updates:
* [79]Debian (October 19th, 2000)
* [80]Caldera (October 19th, 2000)
* [81]Linux-Mandrake (October 19th, 2000)
* [82]Conectiva (October 19th, 2000)
* [83]Red Hat (October 26th, 2000)
* [84]Immunix (October 26th, 2000)
* [85]FreeBSD (November 23rd, 2000)
* [86]Red Hat, Alpha packages added for RH7 (November 30th, 2000)
LPRng format string vulnerability.
Check the [87]September 28, 2000 LWN Security section for the first
report of format string vulnerabilities in LPRng and lpr.
This week's updates:
* [88]Immunix, lpr
Previous updates:
* [89]Turbolinux
* [90]Caldera, LPRng (September 28th)
* [91]Red Hat, LPRng (October 5th)
* [92]Red Hat, lpr (October 5th)
* [93]Immunix, lpr (October 5th)
* [94]Linux-Mandrake, lpr (October 12th)
* [95]Conectiva, lpr (October 12th)
* [96]SuSE, LPRng (not vulnerable) (October 12th)
* [97]Trustix, LPRng (October 12th)
Resources
OpenSSH 2.5.1p2. A new, minor update to the portable version of
OpenSSH 2.5.1p2 [98]has been announced. The new version primarily
contains bug-fixes, none of them specific to any security problem, but
the upgrade is still recommended, possibly in particular to its
bug-fixes for PAM failures seen on Linux (and Solaris) systems.
Events
Upcoming security events.
Date Event Location
March 3-6, 2001. [99]EICAR and Anti-Malware Conference Munich,
Germany.
March 26-29, 2001. [100]Distributed Object Computing Security Workshop
Annapolis, Maryland, USA.
March 27-28, 2001. [101]eSecurity Boston, MA, USA.
March 28-30, 2001. [102]CanSecWest/core01 Network Security Training
Conference Vancouver, British Columbia, Canada.
March 29, 2001. [103]Security of e-Finance and e-Commerce Forum Series
Manhattan, New York, USA.
March 30-April 1, 2001. [104]@LANta.CON Doraville, GA, USA.
April 6-8, 2001. [105]Rubi Con 2001 Detroit, MI, USA.
April 8-12, 2001. [106]RSA Conference 2001 San Francisco, CA, USA.
April 20-22, 2001. [107]First annual iC0N security conference
Cleveland, Ohio, USA.
April 22-25, 2001. [108]Techno-Security 2001 Myrtle Beach, SC, USA.
For additional security-related events, included training courses
(which we don't list above) and events further in the future, check
out Security Focus' [109]calendar, one of the primary resources we use
for building the above list. To submit an event directly to us, please
send a plain-text message to [110]lwn@lwn.net.
Section Editor: [111]Liz Coolbaugh
March 1, 2001
[112]Click Here
Secure Linux Projects [113]Bastille Linux
[114]Immunix
[115]Nexus
[116]SLinux [117]NSA Security-Enhanced
[118]Trustix
Security List Archives
[119]Bugtraq Archive
[120]Firewall Wizards Archive
[121]ISN Archive
Distribution-specific links
[122]Caldera Advisories
[123]Conectiva Updates
[124]Debian Alerts
[125]Kondara Advisories
[126]Esware Alerts
[127]LinuxPPC Security Updates
[128]Mandrake Updates
[129]Red Hat Errata
[130]SuSE Announcements
[131]Yellow Dog Errata
BSD-specific links
[132]BSDi
[133]FreeBSD
[134]NetBSD
[135]OpenBSD
Security mailing lists [136]Caldera
[137]Cobalt
[138]Conectiva
[139]Debian
[140]Esware
[141]FreeBSD
[142]Kondara
[143]LASER5
[144]Linux From Scratch
[145]Linux-Mandrake
[146]NetBSD
[147]OpenBSD
[148]Red Hat
[149]Slackware
[150]Stampede
[151]SuSE
[152]Trustix
[153]turboLinux
[154]Yellow Dog
Security Software Archives
[155]munitions
[156]ZedZ.net (formerly replay.com)
Miscellaneous Resources
[157]CERT
[158]CIAC
[159]Comp Sec News Daily
[160]Crypto-GRAM
[161]LinuxLock.org
[162]Linux Security Audit Project
[163]LinuxSecurity.com
[164]OpenSSH
[165]OpenSEC
[166]Security Focus
[167]SecurityPortal
[168]Next: Kernel
[169]Eklektix, Inc. Linux powered! Copyright Л 2001 [170]Eklektix,
Inc., all rights reserved
Linux (R) is a registered trademark of Linus Torvalds
References
1. http://lwn.net/
2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
3. http://lwn.net/2001/0301/
4. http://lwn.net/2001/0301/kernel.php3
5. http://lwn.net/2001/0301/dists.php3
6. http://lwn.net/2001/0301/desktop.php3
7. http://lwn.net/2001/0301/devel.php3
8. http://lwn.net/2001/0301/commerce.php3
9. http://lwn.net/2001/0301/press.php3
10. http://lwn.net/2001/0301/announce.php3
11. http://lwn.net/2001/0301/history.php3
12. http://lwn.net/2001/0301/letters.php3
13. http://lwn.net/2001/0301/bigpage.php3
14. http://lwn.net/2001/0222/security.php3
15. http://tisc.corecom.com/newsletters/33.html
16. http://www.zdnet.com/enterprise/stories/main/0,10228,2689916,00.html
17. http://news.cnet.com/news/0-1003-201-4933417-0.html
18. http://news.cnet.com/news/0-1003-201-4917560-0.html
19. http://lwn.net/2001/0301/a/lm-MDKSA-2001-023.php3
20. http://lwn.net/2001/0301/a/sec-sudo-credit.php3
21. http://lwn.net/2001/0301/a/sec-sudo.php3
22. http://lwn.net/2001/0301/a/sl-sudo.php3
23. http://lwn.net/2001/0301/a/trustix-sudo.php3
24. http://lwn.net/2001/0301/a/conectiva-sudo.php3
25. http://lwn.net/2001/0301/a/lm-sudo.php3
26. http://lwn.net/2001/0301/a/debian-sudo.php3
27. http://lwn.net/2001/0301/a/immunix-sudo.php3
28. http://lwn.net/2001/0301/a/zope-zclasses.php3
29. http://lwn.net/2001/0301/a/rh-2001-021-06.php3
30. http://lwn.net/2001/0301/a/lm-zope.php3
31. http://lwn.net/2001/0301/a/elmoverflow.php3
32. http://www.securityfocus.com/bid/2403
33. http://lwn.net/2001/0301/a/phpnuke2.php3
34. http://lwn.net/2001/0301/a/phptip.php3
35. http://lwn.net/2001/0301/a/sec-joe.php3
36. http://lwn.net/2001/0301/a/sec-joe-bsd.php3
37. http://lwn.net/2001/0301/a/sl-imapd.php3
38. http://lwn.net/2000/1123/security.php3#pine
39. http://www.securityfocus.com/bid/2391
40. http://www.securityfocus.com/bid/2393
41. http://www.securityfocus.com/bid/2400
42. http://lwn.net/2001/0301/a/cisco-ilmi.php3
43. http://lwn.net/2001/0301/a/cisco-snmp.php3
44. http://lwn.net/2001/0301/a/chilisoft.php3
45. http://lwn.net/2001/0301/a/chilisoftlicense.php3
46. http://lwn.net/2001/0301/a/apc.php3
47. http://lwn.net/2001/0301/a/netsc-collabra.php3
48. http://lwn.net/2001/0222/security.php3#web
49. http://lwn.net/2001/0301/a/rh-analog.php3
50. http://lwn.net/2001/0201/security.php3
51. http://lwn.net/2001/0301/a/tl-bind.php3
52. http://lwn.net/2001/0201/a/cald-bind.php3
53. http://lwn.net/2001/0201/a/con-bind.php3
54. http://lwn.net/2001/0201/a/deb-bind.php3
55. http://lwn.net/2001/0201/a/lm-bind.php3
56. http://lwn.net/2001/0201/a/immunix-bind.php3
57. http://lwn.net/2001/0201/a/rh-bind.php3
58. http://lwn.net/2001/0201/a/sl-bind.php3
59. http://lwn.net/2001/0201/a/su-bind.php3
60. http://lwn.net/2001/0201/a/trustix-bind.php3
61. http://lwn.net/2001/0201/a/yd-bind.php3
62. http://linuxppc.org/security/advisories/LPPCSA-2001-003-1.php3
63. http://lwn.net/2001/0208/a/fb-bind-01-18.php3
64. http://lwn.net/2001/0208/a/cbraq-bind.php3
65. http://lwn.net/2001/0208/a/cbqube-bind.php3
66. http://lwn.net/2001/0215/a/nb-bind.php3
67. http://lwn.net/2001/0104/security.php3#sendmail
68. http://lwn.net/2001/0301/a/tl-sendmail.php3
69. http://lwn.net/2000/1102/security.php3#dump
70. http://lwn.net/2001/0301/a/im-phpdumplpr.php3
71. http://lwn.net/2000/1109/a/sec-rh-dump-upd.php3
72. http://lwn.net/2000/1109/a/sec-lm-dump.php3
73. http://lwn.net/2000/1109/a/sec-trustix-dump.php3
74. http://lwn.net/2000/1109/a/sec-conectiva-dump.php3
75. http://lwn.net/2000/1109/a/sec-kondara-dump.php3
76. http://lwn.net/2000/1116/a/sec-suse-misc.php3
77. http://lwn.net/2000/1019/security.php3#php
78. http://lwn.net/2001/0301/a/im-phpdumplpr.php3
79. http://lwn.net/2000/1019/a/deb-php3.php3
80. http://lwn.net/2000/1019/a/cs-php3.php3
81. http://lwn.net/2000/1019/a/lm-php3.php3
82. http://lwn.net/2000/1019/a/con-php3.php3
83. http://lwn.net/2000/1026/a/rh-apache.php3
84. http://lwn.net/2000/1026/a/sec-im-apache.php3
85. http://lwn.net/2000/1123/a/sec-freebsd-mod_php.php3
86. http://lwn.net/2000/1130/a/sec-rh-apache.php3
87. http://lwn.net/2000/0928/security.php3#lprng
88. http://lwn.net/2001/0301/a/im-phpdumplpr.php3
89. http://lwn.net/2001/0301/a/tl-lprng.php3
90. http://lwn.net/2000/0928/a/sec-lprng.php3
91. http://lwn.net/2000/1005/a/sec-lprng-rh.php3
92. http://lwn.net/2000/1005/a/sec-lpr-rh.php3
93. http://lwn.net/2000/1005/a/sec-lpr-immunix.php3
94. http://lwn.net/2000/1012/a/sec-lpr-mandrake.php3
95. http://lwn.net/2000/1012/a/sec-lpr-conectiva.php3
96. http://lwn.net/2000/1012/a/su-lprng.php3
97. http://lwn.net/2000/1012/a/tr-threefixes.php3
98. http://lwn.net/2001/0301/a/openssh2.5.1p2.php3
99. http://conference.eicar.org/
100. http://www.omg.org/news/meetings/docsec2001/
101. http://www.intmedgrp.com/security/sec01bs/overview.html
102. http://www.dursec.com/conference.html
103. http://www.ists.dartmouth.edu/iria/events/ebizforum.html
104. http://www.atlantacon.org/
105. http://www.rubi-con.org/
106. http://www.rsasecurity.com/conference/rsa2001/index2.html
107. http://lwn.net/2001/0208/a/iC0N.php3
108. http://www.techsec.com/html/Conferences.html
109. http://securityfocus.com/calendar
110. mailto:lwn@lwn.net
111. mailto:lwn@lwn.net
112. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
113. http://bastille-linux.sourceforge.net/
114. http://www.immunix.org/
115. http://Nexus-Project.net/
116. http://www.slinux.org/
117. http://www.nsa.gov/selinux/
118. http://www.trustix.com/
119. http://www.securityfocus.com/bugtraq/archive/
120. http://www.nfr.net/firewall-wizards/
121. http://www.jammed.com/Lists/ISN/
122. http://www.calderasystems.com/support/security/
123. http://www.conectiva.com.br/atualizacoes/
124. http://www.debian.org/security/
125. http://www.kondara.org/errata/k12-security.html
126. http://www.esware.com/actualizaciones.html
127. http://linuxppc.org/security/advisories/
128. http://www.linux-mandrake.com/en/fupdates.php3
129. http://www.redhat.com/support/errata/index.html
130. http://www.suse.de/security/index.html
131. http://www.yellowdoglinux.com/resources/errata.shtml
132. http://www.BSDI.COM/services/support/patches/
133. http://www.freebsd.org/security/security.html
134. http://www.NetBSD.ORG/Security/
135. http://www.openbsd.org/security.html
136. http://www.calderasystems.com/support/forums/announce.html
137. http://www.cobalt.com/support/resources/usergroups.html
138. http://distro.conectiva.com.br/atualizacoes/
139. http://www.debian.org/MailingLists/subscribe
140. http://www.esware.com/lista_correo.html
141. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
142. http://www.kondara.org/mailinglist.html.en
143. http://l5web.laser5.co.jp/ml/ml.html
144. http://www.linuxfromscratch.org/services/mailinglistinfo.php
145. http://www.linux-mandrake.com/en/flists.php3
146. http://www.netbsd.org/MailingLists/
147. http://www.openbsd.org/mail.html
148. http://www.redhat.com/mailing-lists/
149. http://www.slackware.com/lists/
150. http://www.stampede.org/mailinglists.php3
151. http://www.suse.com/en/support/mailinglists/index.html
152. http://www.trustix.net/support/
153. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
154. http://lists.yellowdoglinux.com/ydl_updates.shtml
155. http://munitions.vipul.net/
156. http://www.zedz.net/
157. http://www.cert.org/nav/alerts.html
158. http://ciac.llnl.gov/ciac/
159. http://www.MountainWave.com/
160. http://www.counterpane.com/crypto-gram.html
161. http://linuxlock.org/
162. http://lsap.org/
163. http://linuxsecurity.com/
164. http://www.openssh.com/
165. http://www.opensec.net/
166. http://www.securityfocus.com/
167. http://www.securityportal.com/
168. http://lwn.net/2001/0301/kernel.php3
169. http://www.eklektix.com/
170. http://www.eklektix.com/
--- ifmail v.2.14.os7-aks1
* Origin: Unknown (2:4615/71.10@fidonet)
Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/2030837201523.html, оценка из 5, голосов 10
|