Главная страница


ru.linux

 
 - RU.LINUX ---------------------------------------------------------------------
 From : Sergey Lentsov                       2:4615/71.10   15 Feb 2001  18:24:23
 To : All
 Subject : URL: http://lwn.net/2001/0215/security.php3
 -------------------------------------------------------------------------------- 
 
    [1][LWN Logo] 
    
                                [2]Click Here 
    [LWN.net]
    
    Sections:
     [3]Main page
     Security
     [4]Kernel
     [5]Distributions
     [6]Development
     [7]Commerce
     [8]Linux in the news
     [9]Announcements
     [10]Linux History
     [11]Letters
    [12]All in one big page
    
    See also: [13]last week's Security page.
    
 Security
 
 News and Editorials
 
    SSH Communications opens SSH trademark issue. This week, Tatu Ylonen
    opened up a trademark issue involving terms "ssh" and "secure shell".
    He sent notes out to two public mailing lists, including [14]this
    note, posted to the openssh-unix-dev@mindrot.org development list, and
    [15]this note to BugTraq. In them, he requests that the [16]OpenSSH
    and [17]ScanSSH projects cease to use the string "SSH" as part of
    their product names.
    
    You'll find additional coverage and reader postings on this issue on
    both [18]Slashdot and [19]LinuxToday. In addition, you'll find letters
    to the editor on the topic already in this week's [20]Letters to the
    Editor section.
    
    Two opposed viewpoints are represented in these community exchanges.
    On one hand, many people consider Tatu's notes to have been politely
    worded and are sympathetic with confusion caused by multiple products
    containing the word "SSH". They feel his request for name changes is
    reasonable and have already moved forward to suggesting alternatives
    (SHH, FRESH, ESH, Secure Telnet, ...)
    
    On the other hand, many people don't consider the name change request
    reasonable, regardless of the wording (and the politeness of the
    wording can be argued if you look at statements like, "OpenSSH is
    doing a disservice to the whole Internet security community by
    lengthing the life cycle of the fundamentally broken SSH1 protocols",
    which is not particularly polite, nor necessarily accurate). The
    arguments on their side include:
    
     1. The word SSH is used both to refer to the protocol SSH as well as
        to products from SSH Communications. Trademarking the name of a
        standard is a tricky business; it can be viewed as an attempt to
        monopolize a standard, a bit of a contradiction in terms.
     2. SSH Communications has waited a long time before coming forward to
        enforce their trademark. Their registration of "SSH" dates back to
        1996, yet products such as TGssh, [21]authored in 1997, were never
        asked not to use the name.
     3. The license for [22]ssh 1.2.12, upon which OpenSSH is based,
        states, "Any derived versions of this software must be clearly
        marked as such, and if the derived work is incompatible with the
        protocol description in the RFC file, it must be called by a name
        other than 'ssh' or 'Secure Shell'". OpenSSH is compatible with
        the protocol descriptions, therefore this license can be read to
        have granted them the right to use the terms 'ssh' and 'Secure
        Shell'.
        
    So which is it? A reasonable request that ought to be granted to
    prevent legal wrangles? Or an unreasonable attempt to punish
    well-founded competing projects by restricting them from using the
    name of the protocol that they implement in their products?
    
    For the good of the community, we, of course, would rather see some
    compromise between these two positions that would result in all of us
    ceasing to wrangle about it and getting a chance to move on with
    developing better software and improving security. The search for such
    a compromise is difficult, though, given the strong emotional
    reactions that are cropping up on both sides, at least initially.
    
    So let's look at a couple of possible scenarios and their long-term
    impact.
    
     1. First, imagine that the community reaction against trademarking
        the name of a standard protocol is strong enough that SSH
        Communications decides to drop their request and not to pursue
        legal action. In this case, the status quo continues. SSH
        Communications continues to, in their belief, potentially lose
        customers due to the confusion between the OpenSSH and SSH
        Communications products.
        Unfortunately, we don't actually believe that SSH Communications
        is losing customers due to the confusions between the two products
        but instead due to the well-understood differences between the
        products. From what we have seen, the people who choose to use
        OpenSSH instead of SSH Communications SSH do so because it is Free
        Software. The license for SSH Communications SSH makes it free to
        use and distribute on BSD and Linux platforms, and for
        non-commercial use on other platforms, but restricts commercial
        usage on other platforms. That makes it "not-free" and people have
        a right to vote against such a license by using an alternative.
        In addition, the [23]history of licensing changes to SSH
        Communications SSH should be enough to give pause to any company
        that is considering using it. The license has been opened, closed,
        and opened again over the years. Do you want to bet your company
        on a product whose license might change again next year? With the
        release of SSH Communications SSH 3.X?
     2. Second, imagine, instead, that OpenSSH and ScanSSH and all the
        other existing programs decide to accede to this request and
        change their names. How will you find these programs under their
        new names? Can they use the term "SSH" as a keyword? Can they
        describe their products as compatible with the "SSH" protocol?
        What, indeed, will the impact be on the standardization process
        for the SSH protocol? It must be considered important for SSH
        Communications for the SSH protocol to be adopted as a standard.
        Providing products based on an acknowledged standard is an
        important part of their company's worth and reputation. Right now,
        the SSH Protocol is currently under review by the [24]Internet
        Engineering Task Force. We spoke with Bill Sommerfeld, currently
        the working group chair. In [25]this note, he provides links to
        information about the IETF standards process and touches carefully
        on the impact of the SSH trademark issue. "In practice, IETF
        working groups tend to "engineer around" troublesome IPR
        [Intellectual Property] issues; for instance, the SSH version 2
        protocol was changed to use DSS instead of RSA to avoid the (now
        expired) RSA patent. I can't predict how the working group will
        react to this -- I only know that it will slow things down.
        Needless to say, added delay in the standards process does not
        help the end user."
        The trademark dispute is potentially impairing the standards
        process which should be of critical important to SSH
        Communications.
     3. If neither side backs down, this situation is likely to end up in
        the hands of lawyers. That is actually the worst situation of all.
        OpenSSH is an open source product that brings in no revenue for
        OpenBSD. Embroiling them in an expensive legal wrangle will not
        reflect well on SSH Communications' public image, whether they win
        or lose. They may well lose, due to the length of time they've
        taken to start enforcing their trademark.
        Most important, all of us lose, due to the wasted time and energy.
        
    Looking at all the options above, we would most like to see a fourth
    option created, that would recognize the concerns voiced by Tatu
    Yloenen, without trade-marking the name of an Internet standard,
    particularly one as important to all of us as the SSH protocol
    standard is.
    
    Standards are developed in order to produce interoperability and
    foster competition. Trade-marking the name of the standard is simply
    incompatible with those goals.
    
    Fixes for XFree86 vulnerabilities show up from Debian.
    XFree86 security issues were a common theme throughout the year 2000.
    Unfortunately, distribution updates fixing such problems had a
    tendency to show up late, if ever. For example, in [26]October, 2000,
    we discussed a list of XFree86 security issues, many of them reported
    by Chris Evans. Between then and now, we've only reported one
    distribution update in response to that extensive report. It was
    [27]from Conectiva and only addressed one of the security problems.
    
    This week, Debian has come out with their [28]XFree86 security update.
    It addresses twelve XFree86 security issues in XFree86 3.3.6 reported
    by "Chris Evans, Joseph S. Myers, Michal Zalewski, Alan Cox, and
    others". The fixes are also authored by a numerous and well-known
    group, "including Aaron Campbell, Paulo Cesar Pereira de Andrade,
    Keith Packard, David Dawes, Matthieu Herrb, Trevor Johnson, Colin
    Phipps, and Branden Robinson".
    
    The massive size of this set of fixes gives some glimpse into the
    question as to why distributions have been so slow in getting updates
    out. Nonethless, with the release of the Debian updates, it is to be
    hoped that updates from other distributions will follow much more
    quickly.
    
    This week's updates:
      * [29]Debian (all architectures except m68000)
      * [30]Debian (m68000)
    
 Security Reports
 
    ssh daemon remotely-exploitable integer overflow.
    A remotely-exploitable integer overflow was reported this week in ssh
    daemons that include deattack.c. This includes SSH Communications' ssh
    1.2.24 and later (but not their ssh 2.X products) and versions of
    OpenSSH prior to 2.3.0. This vulnerability can lead to a remote
    attacker executing arbitrary code locally under the uid of the ssh
    daemon (usually root). OpenSSH users are encouraged to upgrade
    immediately to 2.3.0. Users of SSH Communications' ssh daemon are
    encouraged to upgrade to SSH Comunications SSH 2.4 (with ssh1 support
    disabled).
    
    This week's updates:
      * [31]Debian, OpenSSH
      * [32]LinuxPPC, OpenSSH
      * [33]FreeBSD, OpenSSH and SSH1
        
    Multiple Linux kernel 2.2 and 2.4 vulnerabilities.
    Caldera Systems [34]issued an advisory this week reporting two
    security problems affecting both the Linux 2.2 and 2.4 kernel trees.
    The first vulnerability allows large parts of Linux kernel memory to
    be read by passing a negative offset to sysctl. The second
    vulnerability is a race condition where ptrace is attached to a setuid
    program and used to modify that program.
    
    Following this report, Red Hat issued [35]their advisory, which
    included their fixes for the sysctl and ptrace problems, as well as a
    fix for an unspecified vulnerability specific to the Pentium III
    patch. Note that the Red Hat advisory credits Solar Designer for
    discovering the sysctl bug, but this in incorrect. Solar Designer
    posted a note stating that Chris Evans discovered and [36]reported the
    sysctl bug.
    
    The security fixes for sysctl and ptrace have been integrated into
    [37]2.2.19pre9; the Pentium III bug only affects the 2.2 kernel series
    if the Pentium III patches have been applied.
    
    Linux 2.4 was not vulnerable to the ptrace issue. Fixes for the sysctl
    and Pentium III bugs have been integrated into the -ac development
    tree.
    
    This week's updates:
      * [38]Caldera
      * [39]Red Hat
      * [40]Immunix
      * [41]Trustix
        
    ja-xklock local root compromise. FreeBSD reported a [42]local root
    compromise in ja-xklock, a "localized" xlock clone which is part of
    the FreeBSD ports. ja-xklock does not appear to be popular under
    Linux, but may show up on other BSD systems.
    
    mars_nwe potential remote root compromise. FreeBSD reported a
    [43]potential remote root compromise in their mars_nwe port, due to a
    format string vulnerability. Mars_nwe is Novell Netware server
    emulator. This vulnerability is not specific to FreeBSD.
    
    elvis-clone exploitable buffer overflow. A remote root compromise is
    possible due to an [44]exploitable buffer overflow in two elvis-clones
    in FreeBSD, ja-elvis and ko-helvis. The buffer overflow was found in
    the elvrec utility, as a result of an internal audit. This
    vulnerability is not specific to FreeBSD.
    
    dc20ctrl locally-exploitable buffer overflow. dc20ctrl, a program for
    controlling Kodak DC20 digital cameras, contains a [45]buffer overflow
    that can be exploited locally, reports FreeBSD. The overflow can be
    exploited to gain access to the serial port devices on FreeBSD,
    however the program itself is not specific to FreeBSD.
    
    FreeBSD-specific advisories. FreeBSD released the following advisories
    this week for vulnerabilities specific to FreeBSD:
      * [46]ipfw/ip6fw allows bypassing of 'established' keyword (updated
        advisory)
      * [47]inetd ident server remote file read access (updated advisory)
        
    m4 buffer overflow. A [48]buffer overflow in m4 has been reported and
    confirmed on Slackware 7.1.0 and Red Hat 6.1. Oddly enough, there has
    been no follow-up to these reports and no update to m4 has been
    published.
    
    LICQ/GnomeICU denial-of-service vulnerability. Sending an RTF (Rich
    Text Format) file to LICQ or GnomeICU on a target computer will crash
    the application, [49]reports No Strezzz Cazzz. Both are applications
    that support ICQ-based communications. No updates to to LICQ have been
    published. GnomeICU 0.95.1 and 0.95.2 have been [50]released, but the
    descriptions of these updates do not indicate whether or not this
    problem has been solved.
    
    Note that a [51]similar problem was reported in kicq and a patch for
    it has been released.
    
    MySQL buffer overrun. [52]MySql version 3.23.33 was released this week
    and contains a fix for two buffer overruns, one in the libmysqlclient
    library and the other in DROP DATABASE.
    
    Web scripts.
    The following Web scripts were reported to contain vulnerabilities:
      * [53]Phpnuke is reported to be exploitable remotely to read files,
        and, depending on the remote configuration, execute PHP code or
        other arbitrary code on the server. The author is aware of the
        problem and has [54]released a patched version.
      * [55]An additional problem with PHPNuke was reported by rain forest
        puppy. After a long, detailed exploration of the problem,
        amounting to almost a full security audit, he indicates that he
        communicated the problems to the author, PHP-Nuke 4.4 was released
        40 days later and he does not yet know whether his suggested
        improvements/fixes have been incorporated.
        
    Commercial products.
    The following commercial products were reported to contain
    vulnerabilities:
      * IBM's IBM Net.Commerce package, including IBM Net.Commerce and IBM
        WebSphere Commerce Suite, are reported to contain a [56]remote
        arbitrary command execution vulnerability due to macros that do
        not validate user input properly. Net.Commerce Versions 3.2 and
        WebSphere Commerce Suite 4.1 contain corrected versions of the
        macros. Note that although IBM Websphere includes Apache, Apache
        itself is not impacted by this report.
        
 Updates
 
    SSH protocol 1.5 key session recovery vulnerability.
    Check [57]last week's LWN Security Summary for the initial report.
    
    Note that our original coverage contained errors due to our incorrect
    interpretation of the [58]original advisory. We reported that OpenSSH
    2.3.0 and earlier were vulnerable (in addition to ssh1.2.31 and
    earlier), because a patch to correct the problem had been introduced
    into the OpenSSH tree. We received feedback this week from Theo de
    Raadt, Ivan Arce and Markus Friedl correcting that impression. In
    fact, OpenSSH 2.2.0 and later are not exploitable via this
    vulnerability. The maximum number of concurrent unauthenticated
    connections is automatically defaulted to 10 and random early drop can
    also be enabled.
    
    Multiple vulnerabilities in bind 8.2.2 and bind 4.
    Check the [59]February 1st LWN Security Summary for the initial
    reports. Bind 8.2.3 contains fixes for the problems with 8.2.2. Bind 4
    fixes are also available, but an upgrade to bind 8 or even bind 9 is
    generally considered a preferable approach.
    
    This week's updates:
      * [60]NetBSD
        
    Previous updates:
    
      * [61]Caldera Systems (February 1st)
      * [62]Conectiva (February 1st)
      * [63]Debian (February 1st)
      * [64]Linux-Mandrake (February 1st)
      * [65]Immunix (February 1st)
      * [66]Red Hat (February 1st)
      * [67]Slackware (February 1st)
        
      * [68]SuSE (February 1st)
      * [69]Trustix (February 1st)
      * [70]Yellow Dog Linux (February 1st)
      * [71]LinuxPPC (February 8th)
      * [72]FreeBSD (February 8th)
      * [73]Cobalt bind 8.2.3 (for the RaQ2 only) (February 8th)
      * [74]Cobalt bind 4 (for the Qube1, RaQ1 and Qube2) (February 8th)
                                       
    Multiple vulnerabilities in ProFTPD.
    Check the [75]February 8th, 2001 LWN Security Summary for details.
    ProFTPD 1.2.0rc3 contains fixes for all the above problems.
    
    This week's updates:
      * [76]Conectiva
      * [77]Linux-Mandrake
      * [78]Debian
      * [79]Trustix
        
    Previous updates:
      * [80]Cobalt, unofficial package updates (February 8th)
        
    man -l format string vulnerability.
    Check the [81]February 8th LWN Security Summary for details. Note that
    only distributions with a man command that supports the "-l" option
    are affected. This would include SuSE, Debian and distributions
    derived from them.
    
    This week's updates:
      * [82]Debian
        
    Secure Locate buffer overflow.
    Check the [83]November 30th, 2000 LWN Security Summary for the
    original report of this problem.
    
    This week's updates:
      * [84]Turbolinux
        
    Previous updates:
      * [85]Debian (December 21st, 2000)
      * [86]Linux-Mandrake (December 21st, 2000)
      * [87]Red Hat (December 21st, 2000)
      * [88]Conectiva (January 11th)
        
    Netscape 4.75 buffer overflow.
    First spotted via [89]this FreeBSD advisory and reported on November
    9th, a buffer overflow in Netscape 4.75 enables a client-side exploit.
    Check the [90]November 9th LWN Security Summary for our original
    report. Netscape 4.76, which was released on October 24th, fixes the
    problem.
    
    This week's updates:
      * [91]Turbolinux
        
    Previous updates:
      * [92]FreeBSD (November 9th, 2000)
      * [93]Red Hat (November 23rd, 2000)
      * [94]Immunix (November 23rd, 2000)
      * [95]Conectiva (November 30th, 2000)
      * [96]Red Hat, Alpha packages added for RH7 (November 30th, 2000)
      * [97]SuSE (December 7th, 2000)
      * [98]Kondara (December 7th, 2000)
      * [99]Linux-Mandrake (December 21st, 2000)
        
 Resources
 
    ScanSSH. Niels Provos has released a protocol scanner, currently named
    [100]ScanSSH, which can be used to help find vulnerable SSH daemons so
    they can be upgraded quickly.
    
    Ramenfind 0.4. A new version of the [101]Ramenfind script was released
    this week. It handles a new Ramen variant that showed up this past
    week. That should also be a reminder to everyone to apply your
    security updates, the best way to protect against the Ramen worm.
    
 Events
 
    Call for Papers: New Security Paradigms Workshop (NSPW). Crispin Cowan
    sent out the [102]Call-For-Papers for this year's [103]New Security
    Paradigms Workshop, which is being held September 11th through the
    14th, 2001, in Cloudcroft, New Mexico, USA. "In order to preserve the
    small, focused nature of the workshop, participation is limited to
    authors of accepted papers and conference organizers. Because we
    expect new paradigms we accept wide-ranging topics in information
    security. Any paper that presents a significant shift in thinking
    about difficult security issues or builds on a previous shift is
    welcomed."
    
    Upcoming security events.
    
    Date Event Location
    February 19-22, 2001. [104]Financial Cryptography 2001 Grand Cayman,
    BWI.
    February 19-22, 2001. [105]VPN Con San Jose, CA, USA.
    February 24-March 1, 2001. [106]InfoSec World 2001 Orlando, FL, USA.
    March 3-6, 2001. [107]EICAR and Anti-Malware Conference Munich,
    Germany.
    March 27-28, 2001. [108]eSecurity Boston, MA, USA.
    March 30-April 1, 2001. [109]@LANta.CON Doraville, GA, USA.
    April 6-8, 2001. [110]Rubi Con 2001 Detroit, MI, USA.
    
    For additional security-related events, included training courses
    (which we don't list above) and events further in the future, check
    out Security Focus' [111]calendar, one of the primary resources we use
    for building the above list. To submit an event directly to us, please
    send a plain-text message to [112]lwn@lwn.net.
    
    Section Editor: [113]Liz Coolbaugh
    February 15, 2001
    
                               [114]Click Here 
    Secure Linux Projects [115]Bastille Linux
    [116]Immunix
    [117]Nexus
    [118]SLinux [119]NSA Security-Enhanced
    [120]Trustix
    Security List Archives
    [121]Bugtraq Archive
    [122]Firewall Wizards Archive
    [123]ISN Archive
    Distribution-specific links
    [124]Caldera Advisories
    [125]Conectiva Updates
    [126]Debian Alerts
    [127]Kondara Advisories
    [128]Esware Alerts
    [129]LinuxPPC Security Updates
    [130]Mandrake Updates
    [131]Red Hat Errata
    [132]SuSE Announcements
    [133]Yellow Dog Errata
    BSD-specific links
    [134]BSDi
    [135]FreeBSD
    [136]NetBSD
    [137]OpenBSD
    Security mailing lists [138]Caldera
    [139]Cobalt
    [140]Conectiva
    [141]Debian
    [142]Esware
    [143]FreeBSD
    [144]Kondara
    [145]LASER5
    [146]Linux From Scratch
    [147]Linux-Mandrake
    [148]NetBSD
    [149]OpenBSD
    [150]Red Hat
    [151]Slackware
    [152]Stampede
    [153]SuSE
    [154]Trustix
    [155]turboLinux
    [156]Yellow Dog
    Security Software Archives
    [157]munitions
    [158]ZedZ.net (formerly replay.com)
    Miscellaneous Resources
    [159]CERT
    [160]CIAC
    [161]Comp Sec News Daily
    [162]Crypto-GRAM
    [163]LinuxLock.org
    [164]Linux Security Audit Project
    [165]LinuxSecurity.com
    [166]OpenSSH
    [167]OpenSEC
    [168]Security Focus
    [169]SecurityPortal
    
    
                                                         [170]Next: Kernel
    
    [171]Eklektix, Inc. Linux powered! Copyright Л 2001 [172]Eklektix,
    Inc., all rights reserved
    Linux (R) is a registered trademark of Linus Torvalds
 
 References
 
    1. http://lwn.net/
    2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012
    3. http://lwn.net/2001/0215/
    4. http://lwn.net/2001/0215/kernel.php3
    5. http://lwn.net/2001/0215/dists.php3
    6. http://lwn.net/2001/0215/devel.php3
    7. http://lwn.net/2001/0215/commerce.php3
    8. http://lwn.net/2001/0215/press.php3
    9. http://lwn.net/2001/0215/announce.php3
   10. http://lwn.net/2001/0215/history.php3
   11. http://lwn.net/2001/0215/letters.php3
   12. http://lwn.net/2001/0215/bigpage.php3
   13. http://lwn.net/2001/0208/security.php3
   14. http://lwn.net/2001/0215/a/ssh-tm.php3
   15. http://lwn.net/2001/0215/a/ylo.php3
   16. http://www.openssh.com/
   17. http://www.monkey.org/~provos/scanssh/
   18. http://slashdot.org/articles/01/02/14/1120247.shtml
   19. http://linuxtoday.com/news_story.php3?ltsn=2001-02-14-003-04-NW-SW-BD
   20. http://lwn.net/2001/0215/letters.php3
   21. http://msgs.securepoint.com/cgi-bin/get/openssh-unix-dev-0102/104.html
   22. http://wwwcip.informatik.uni-erlangen.de/~msfriedl/LIC/ssh-1.2.12/COPYING
   23. http://wwwcip.informatik.uni-erlangen.de/~msfriedl/LIC/
   24. http://www.ietf.org/
   25. http://lwn.net/2001/0215/a/ietf.php3
   26. http://lwn.net/2000/1026/security.php3
   27. http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000220
   28. http://lwn.net/2001/0215/a/deb-xfree86.php3
   29. http://lwn.net/2001/0215/a/deb-xfree86.php3
   30. http://lwn.net/2001/0215/a/db-xfree86-m68k.php3
   31. http://lwn.net/2001/0215/a/deb-openssh.php3
   32. http://lwn.net/2001/0215/a/lp-openssh.php3
   33. http://lwn.net/2001/0215/a/fb-openssh.php3
   34. http://lwn.net/2001/0215/a/cald-ptrace.php3
   35. http://lwn.net/2001/0215/a/rh-kernel.php3
   36.
 http://securityfocus.com/frames/?content=/templates/archive.pike%3Fstart%3D2001-
 02-11%26tid%3D162260%26list%3D1%26fromthread%3D0%26threads%3D1%26end%3D2001-02-1
 7%26
   37. http://lwn.net/2001/0215/a/2.2.19pre9.php3
   38. http://lwn.net/2001/0215/a/cald-ptrace.php3
   39. http://lwn.net/2001/0215/a/rh-kernel.php3
   40. http://lwn.net/2001/0215/a/im-kernel.php3
   41. http://lwn.net/2001/0215/a/tr-kernelproftpd.php3
   42. http://lwn.net/2001/0215/a/fb-ja-xklock.php3
   43. http://lwn.net/2001/0215/a/fb-mars_nwe.php3
   44. http://lwn.net/2001/0215/a/fb-elvis.php3
   45. http://lwn.net/2001/0215/a/fb-dc20ctrl.php3
   46. http://lwn.net/2001/0215/a/fb-ipfw.php3
   47. http://lwn.net/2001/0215/a/fb-inetd.php3
   48.
 http://securityfocus.com/frames/?content=/templates/archive.pike%3Fend%3D2001-02
 -10%26start%3D2001-02-04%26list%3D1%26threads%3D1%26fromthread%3D0%26tid%3D16142
 4%26
   49. http://lwn.net/2001/0215/a/licq.php3
   50. http://freshmeat.net/releases/40800/
   51. http://lwn.net/2001/0215/a/kicq.php3
   52. http://lwn.net/2001/0215/a/mysql.php3
   53. http://lwn.net/2001/0215/a/phpnuke.php3
   54. http://lwn.net/2001/0215/a/phpnuke2.php3
   55. http://lwn.net/2001/0215/a/morephpnuke.php3
   56. http://www.securityfocus.com/bid/2350
   57. http://lwn.net/2001/0208/security.php3#ssh1.5key
   58. http://lwn.net/2001/0208/a/sshprotocol1.5.php3
   59. http://lwn.net/2001/0201/security.php3
   60. http://lwn.net/2001/0215/a/nb-bind.php3
   61. http://lwn.net/2001/0201/a/cald-bind.php3
   62. http://lwn.net/2001/0201/a/con-bind.php3
   63. http://lwn.net/2001/0201/a/deb-bind.php3
   64. http://lwn.net/2001/0201/a/lm-bind.php3
   65. http://lwn.net/2001/0201/a/immunix-bind.php3
   66. http://lwn.net/2001/0201/a/rh-bind.php3
   67. http://lwn.net/2001/0201/a/sl-bind.php3
   68. http://lwn.net/2001/0201/a/su-bind.php3
   69. http://lwn.net/2001/0201/a/trustix-bind.php3
   70. http://lwn.net/2001/0201/a/yd-bind.php3
   71. http://linuxppc.org/security/advisories/LPPCSA-2001-003-1.php3
   72. http://lwn.net/2001/0208/a/fb-bind-01-18.php3
   73. http://lwn.net/2001/0208/a/cbraq-bind.php3
   74. http://lwn.net/2001/0208/a/cbqube-bind.php3
   75. http://lwn.net/2001/0208/security.php3#proftpd
   76. http://lwn.net/2001/0215/a/con-proftpd.php3
   77. http://lwn.net/2001/0215/a/lm-proftpd.php3
   78. http://lwn.net/2001/0215/a/deb-proftpd.php3
   79. http://lwn.net/2001/0215/a/tr-kernelproftpd.php3
   80. http://lwn.net/2001/0208/a/cb-proftpd.php3
   81. http://lwn.net/2001/0208/security.php3#man
   82. http://lwn.net/2001/0215/a/deb-man-db.php3
   83. http://lwn.net/2000/1130/security.php3#slocate
   84. http://lwn.net/2001/0215/a/tl-slocate.php3
   85. http://lwn.net/2000/1221/a/deb-slocate.php3
   86. http://lwn.net/2000/1221/a/sec-lm-slocate.php3
   87. http://lwn.net/2000/1221/a/sec-rh-slocate.php3
   88. http://lwn.net/2001/0111/a/con-slocate.php3
   89. http://lwn.net/2000/1109/a/sec-freebsd-netscape.php3
   90. http://lwn.net/2000/1109/security.php3#netscape
   91. http://lwn.net/2001/0215/a/tl-netscape.php3
   92. http://lwn.net/2000/1109/a/sec-freebsd-netscape.php3
   93. http://lwn.net/2000/1123/a/rh-netscape.php3
   94. http://lwn.net/2000/1123/a/sec-immunix-netscape.php3
   95. http://lwn.net/2000/1130/a/con-netscape.php3
   96. http://lwn.net/2000/1130/a/sec-rh-netscape.php3
   97. http://lwn.net/2000/1207/a/sec-suse-netscape.php3
   98. http://lwn.net/2000/1207/a/sec-kondara-netscape.php3
   99. http://lwn.net/2000/1221/a/sec-lm-netscape.php3
  100. http://lwn.net/2001/0215/a/scanssh.php3
  101. http://lwn.net/2001/0215/a/ramenfind.php3
  102. http://lwn.net/2001/0215/a/sec-nspw-cfp.php3
  103. http://www.nspw.org/
  104. http://fc01.ai/
  105. http://www.vpncon.com/2001events/spring/spring2001index.htm
  106. http://www.misti.com/conference_show.asp?id=OS01
  107. http://conference.eicar.org/
  108. http://www.intmedgrp.com/security/sec01bs/overview.html
  109. http://www.atlantacon.org/
  110. http://www.rubi-con.org/
  111. http://securityfocus.com/calendar
  112. mailto:lwn@lwn.net
  113. mailto:lwn@lwn.net
  114. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity
  115. http://bastille-linux.sourceforge.net/
  116. http://www.immunix.org/
  117. http://Nexus-Project.net/
  118. http://www.slinux.org/
  119. http://www.nsa.gov/selinux/
  120. http://www.trustix.com/
  121. http://www.securityfocus.com/bugtraq/archive/
  122. http://www.nfr.net/firewall-wizards/
  123. http://www.jammed.com/Lists/ISN/
  124. http://www.calderasystems.com/support/security/
  125. http://www.conectiva.com.br/atualizacoes/
  126. http://www.debian.org/security/
  127. http://www.kondara.org/errata/k12-security.html
  128. http://www.esware.com/actualizaciones.html
  129. http://linuxppc.org/security/advisories/
  130. http://www.linux-mandrake.com/en/fupdates.php3
  131. http://www.redhat.com/support/errata/index.html
  132. http://www.suse.de/security/index.html
  133. http://www.yellowdoglinux.com/resources/errata.shtml
  134. http://www.BSDI.COM/services/support/patches/
  135. http://www.freebsd.org/security/security.html
  136. http://www.NetBSD.ORG/Security/
  137. http://www.openbsd.org/security.html
  138. http://www.calderasystems.com/support/forums/announce.html
  139. http://www.cobalt.com/support/resources/usergroups.html
  140. http://distro.conectiva.com.br/atualizacoes/
  141. http://www.debian.org/MailingLists/subscribe
  142. http://www.esware.com/lista_correo.html
  143. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL
  144. http://www.kondara.org/mailinglist.html.en
  145. http://l5web.laser5.co.jp/ml/ml.html
  146. http://www.linuxfromscratch.org/services/mailinglistinfo.php
  147. http://www.linux-mandrake.com/en/flists.php3
  148. http://www.netbsd.org/MailingLists/
  149. http://www.openbsd.org/mail.html
  150. http://www.redhat.com/mailing-lists/
  151. http://www.slackware.com/lists/
  152. http://www.stampede.org/mailinglists.php3
  153. http://www.suse.com/en/support/mailinglists/index.html
  154. http://www.trustix.net/support/
  155. http://www.turbolinux.com/mailman/listinfo/tl-security-announce
  156. http://lists.yellowdoglinux.com/ydl_updates.shtml
  157. http://munitions.vipul.net/
  158. http://www.zedz.net/
  159. http://www.cert.org/nav/alerts.html
  160. http://ciac.llnl.gov/ciac/
  161. http://www.MountainWave.com/
  162. http://www.counterpane.com/crypto-gram.html
  163. http://linuxlock.org/
  164. http://lsap.org/
  165. http://linuxsecurity.com/
  166. http://www.openssh.com/
  167. http://www.opensec.net/
  168. http://www.securityfocus.com/
  169. http://www.securityportal.com/
  170. http://lwn.net/2001/0215/kernel.php3
  171. http://www.eklektix.com/
  172. http://www.eklektix.com/
 
 --- ifmail v.2.14.os7-aks1
  * Origin: Unknown (2:4615/71.10@fidonet)
 
 

Вернуться к списку тем, сортированных по: возрастание даты  уменьшение даты  тема  автор 

 Тема:    Автор:    Дата:  
 URL: http://lwn.net/2001/0215/security.php3   Sergey Lentsov   15 Feb 2001 18:24:23 
Архивное /ru.linux/20308a3ca3542.html, оценка 2 из 5, голосов 10
Яндекс.Метрика
Valid HTML 4.01 Transitional