|
ru.linux- RU.LINUX --------------------------------------------------------------------- From : Sergey Lentsov 2:4615/71.10 19 Apr 2001 17:11:22 To : All Subject : URL: http://lwn.net/2001/0419/security.php3 -------------------------------------------------------------------------------- [1][LWN Logo] [2]Click Here [LWN.net] Sections: [3]Main page Security [4]Kernel [5]Distributions [6]On the Desktop [7]Development [8]Commerce [9]Linux in the news [10]Announcements [11]Linux History [12]Letters [13]All in one big page See also: [14]last week's Security page. Security News and Editorials Red Hat mkpasswd limitations. A limitation in the Red Hat mkpasswd command was [15]discussed on BugTraq this week. Mkpasswd is an expect script that can be used to generate random passwords. Similar to a recently reported problem with a password generator for the Palm, it seems that mkpasswd uses an inadequate seed, based on the process ID, which results in a much smaller pool of passwords than is expected. Of course, the smaller the pool of passwords, the easier it is to brute-force a password. In addition to the importance of using a good random seed in the password generator, the need to reseed was also discussed. Using the Tcl 8 rand() function as an example, it was shown that seeding only once produce in the range of 22,000 passwords before duplicates began to occur. The Tcl 8 rand() function uses the system clock for a seed. Alternately using a weaker seed but reseeding with each invocation, more than 45,000 passwords were generated without a duplicate occurring. We expect an update for the Red Hat mkpasswd command will be provided in the near future. Meanwhile, sites that use password generators to assign passwords may want to look more closely at the algorithms upon which they are depending. Disabling Module Loading Caveat. A piece of information was accidentally left out of [16]last week's lead-in editorial, which talked about using the capability bounding set to disable the loading of kernel modules. In June of 2000, Patrick Reynolds sent in a [17]Letter to the Editor pointing out that "/proc/sys/kernel/cap-bound maps directly to the cap_bset variable in kernel memory". As a result, unless CAP_SYS_RAWIO is disabled (it controls access to /dev/mem), it is possible to use /dev/mem to load new code into the kernel (this will require access to a valid System.map file). Unfortunately, disabling /dev/mem will break many things, including X and potentially many other user-space programs. The use of capability bounding sets will still assist in protecting systems from many current rootkits that use loadable kernel modules, but, as common with most security issues, they only provide a partial solution. (Thanks to Neale Pickett for pointing out our error in omitting this information last week). Carko distributed-denial-of-service tool. A new distributed denial-of-service tool, named [18]Carko, was reported on various systems this week. Carko is a clone of stacheldraht+antigl+yps, with apparently as little as [19]one source code line difference. However, it has been updated to leverage much newer vulnerabilities, in particular a [20]buffer overflow in snmpXdmid under Solaris. Although Carko is not currently targeting Linux vulnerabilities, it is a reminder that the problem of distributed denial-of-service attacks has not been resolved. For now, the best defense for all of us is not only to close all vulnerabilities on our own systems in a timely manner, but also to encourage and support everyone else we know to do likewise. Carko is spreading because the availability of hosts with open vulnerabilities is vast. CRYPTO-GRAM newsletter. Bruce Schneier's [21]CRYPTO-GRAM newsletter for April is out. It covers computer security from a military defensive point of view, the fake Microsoft certificates, and more. Microsoft: Closed source is more secure (SecurityFocus). SecurityFocus has put up [22]a report from Microsoft security head Steve Lipner's talk at the RSA Conference. "Lipner slammed the open source development process, suggesting that the often-voluntary nature of creating works like the Linux operating system make it less disciplined, and less secure. 'The open source model tends to emphasize design and development. Testing is boring and expensive.'" Reading through the comments posted to SecurityFocus revealed little support for Lipner's words, but that could be expected from an audience that is both security-savvy and extremely familiar with Open Source software. The most relevant comment we found was from "Will" who [23]pointed out that the majority of advisories from Microsoft credit people outside their own staff for finding the security holes. That indicates that a "dedicated, trained, full time and paid" staff isn't the answer either. Neither closed source nor Open Source software is as secure as it needs to become. Security Reports Linux Kernel 2.4 Netfilter/IPTables vulnerability. Under Linux 2.4, IPTables is used for building firewalls. It is implemented under the NetFilter framework, a raw framework for filtering and mangling packets. A [24]vulnerability has been reported in the manner that the RELATED state is implemented which can be exploited to potentially bypass a firewall and access ports that are assumed to be protected. The NetFilter team has provided [25]a patch for Linux 2.4.3. Note that the patch may be subject to future revision; a URL is provided where the latest version can be found. Presumably the patch, or its future incarnation, will be provided in an upcoming version of 2.4. Meanwhile, the original posting provides details that network engineers will want to examine to improve and tighten the use of the RELATED state. Samba 2.0.8 security issue. Andrew Tridgell posted a note to BugTraq that [26]Samba 2.0.8 has been released to address a significant security vulnerability that allows local users to corrupt local devices (such as raw disks). * [27]Trustix * [28]Debian * [29]Immunix * [30]Caldera cfingerd format string vulnerability. A [31]format string vulnerability has been reported in cfingerd ("Configurable Finger Daemon") which can be used remotely to gain root privileges and execute arbitrary code. An exploit for this vulnerability has been published and a patch to fix the problem is available. [32]Debian Debian Security Advisory for exuberant-ctags. Colin Phipps discovered that the exuberant-ctags package, as distributed with Debian GNU/Linux 2.2, [33]creates temporary files insecurely. This has been fixed in version 1:3.2.4-0.1 of the Debian package, and upstream version 3.5. Other distributions that ship this package will also be impacted bubblemon kmem permissions vulnerability. [34]bubblemon, an application that displays CPU and memory load as bubbles in a jar of water, is installed setgid kmem under FreeBSD. As a result, it can be [35]exploited to execute arbitrary commands under group kmem. It has not been reported whether or not the same problem crops up on other BSD systems or on Linux. A new version, Bubblemon 1.32, has been released with a fix for the problem. web scripts. The following web scripts were reported to contain vulnerabilities: * [36]Crosswind's Cyberscheduler is reported to contain a buffer overflow in the variable that holds the time zone information. An exploit for the problem has been published and a fix is reportedly available on the [37]Crosswind website. Commercial products. The following commercial products were reported to contain vulnerabilities: * [38]Lightwave ConsoleServer 3200, a console switch, discloses sensitive information to non-authenticated users. A hardware upgrade (a new network card using embedded Linux) to resolve the problem is scheduled for this summer. Until then, the only workaround is to firewall the device to prevent connections from outside the local network. * A format string vulnerability has been reported in [39]Hylafax hfaxd. Successful exploitation of the vulnerability will allow an attacker to gain root privileges. Hylafax has released patches to fix the problem. * [40]Cisco VPN 3000 Concentrator is vulnerable to a denial-of-service attack based on its inability to properly handle specific malformed IP packets. Upgraded firmware to correct the problem is available. * [41]NCM Content Management System contains a perl script, content.pl, which does insufficient input checking. As a result, it can be exploited to execute arbitrary SQL queries. An upgrade to fix the problem has been released. * [42]Trend Micro Interscan Viruswall, a software scanning package that watches SMTP, FTP and HTTP transfers, contains multiple CGI programs that have buffer overflows in them. As a result, the package can be exploited remotely to gain root access. An upgrade to fix the problem has been made available. * The [43]Cisco Catalyst 5000 Series has been reported vulnerable to a network storm as a result of receiving a 802.1x frame on an STP block port. Software updates for the problem are either available now or promised in the near future. Updates Netscape 4.76 GIF comment vulnerability. Check the [44]April 12th LWN Security Summary for the original report. The vulnerability can be used to embed executable Javascript in GIF comments which are then executed by the viewer when loading the GIF file. This has been fixed in Netscape 4.77, which is available for download from ftp.netscape.com. This week's updates: * [45]Red Hat, includes support for new 7.1 distribution * [46]Immunix * [47]Conectiva Previous updates: * [48]Red Hat (April 12th) ntp remotely exploitable static buffer overflow. An exploit for a static buffer overflow in the Network Time Protocol (ntp) was published on April 4th. This exploit can allow a remote attacker to crash the ntp daemon and possibly execute arbitrary commands on the host. Patches and new packages to fix this problem came out quickly. It is recommended that you upgrade your ntp package immediately. If you cannot, disabling the service until you can is a good idea. For more details and links to related posts, check BugTraq ID [49]2540. This week's updates: * [50]KRUD * [51]FreeBSD * [52]Progeny Previous updates: * [53]Caldera (April 12th) * [54]Conectiva (April 12th) * [55]Debian (April 12th) * [56]Debian, original patch to ntp introduced a potential denial-of-service problem, fixed in new updates to ntp. (April 12th) * [57]Engarde (April 12th) * [58]Immunix (April 12th) * [59]Linux-Mandrake (April 12th) * [60]NetBSD (April 12th) * [61]Progeny (April 12th) * [62]Red Hat (April 12th) * [63]Slackware (April 12th) * [64]SuSE (April 12th) * [65]Trustix (April 12th) IP Filter fragment caching vulnerability. Check the [66]April 12th LWN Security Summary for the original report. [67]IP Filter 3.4.17 has been released with a fix for the problem. BugTraq ID [68]2545. This week's updates: * [69]FreeBSD Multiple FTP daemon globbing vulnerability. Check the [70]April 12th LWN Security Summary for the original report. This week's updates: * [71]FreeBSD Previous updates: * [72]NetBSD ptrace/execve/procfs race condition in the Linux kernel 2.2.18. Exploits were released the week of [73]March 29th for a [74]ptrace/execve/procfs race condition in the Linux kernel 2.2.18. As a result, an upgrade to Linux 2.2.19 is recommended. Last week, Alan Cox put up the [75]Linux 2.2.19 release notes, finally giving the specifics on all the security-related fixes in 2.2.19 (all thirteen of them!) and giving credit to the [76]Openwall project and Chris Evans, for the majority of the third-party testing and auditing work that turned up these bugs. Fixes for the same bugs have also been ported forward into the 2.4.X kernel series. This week's updates: * [77]Debian * [78]Red Hat * [79]Linux-Mandrake Previous updates: * [80]Immunix (March 29th) * [81]Linux 2.2.19 release notes * [82]Caldera, 2.2.19 security fixes (April 5th) backported to 2.2.10 and 2.2.14, the kernels used in various Caldera products * [83]Trustix (April 12th) * [84]Progeny (April 12th) * [85]Progeny, advisory updated due to error in update instructions. (April 12th) OpenSSH 2.5.2p2 released. [86]OpenSSH 2.5.2p2 was announced the week of [87]March 29th. It contains a number of fixes (including improvements in the defenses against the passive analysis attacks discussed in the [88]March 22nd LWN security page) and quite a few new features as well. This week's updates: * [89]Progeny Previous updates: * [90]Linux-Mandrake (March 29th) * [91]Conectiva (March 29th) * [92]Immunix (March 29th) * [93]Red Hat (RH 7 only) (March 29th) * [94]Trustix (April 5th) * [95]Red Hat, links updated as a result of a directory restructure on the update site (April 5th) * [96]Slackware changelog notice pico symbolic link vulnerability. Check the [97]December 14th, 2000 LWN Security Summary for the initial report of this problem. Note that this has also been reported as a [98]pine vulnerability, but the vulnerable component is still pico, not pine. Check BugTraq ID [99]2097 for more details. This is the first distribution update we've seen for this four-month-old vulnerability. This week's update: * [100]Red Hat * [101]Immunix Resources New Security Mailing Lists. In an apparent effort to lessen the load on the BugTraq mailing list, Security Focus has announced [102]four new mailinglists: * SECTOOLS - For the announcement of new or updated (free) security tools. * SECPAPERS - For the announcement of new security papers, articles, & books. * SECEVENTS - For the announcement or call for papers for events (e.g. conferences, symposia, etc). * SECPROD - For the announcement of new or updated security products. Hacker Tools and Their Signatures, Part One: bind8x.c. Toby Miller has started a series of articles detailing hacker exploits/tools and their signatures. The first article in this series focuses on [103]bind8x.c. "The discussion will cover the details of bind8x.c and provide signatures that will assist an IDS analyst in detecting it. This paper assumes that the reader has some basic knowledge of TCP/IP and understands the tcpdump format". Adore Detection. Duncan Simpson [104]wrote in this week to point out a couple of tools that can be used to detect the Adore worm, including rkscan and checkps 1.3.2. "Checkps 1.3.2 in kill scanning mode should now detect adore due to two additional tests as to whether a pid really exists (adore "fixes" the kill system call)". Events Upcoming Security Events. Date Event Location April 20 - 22, 2001 [105]First annual iC0N security conference Cleveland, Ohio, USA April 22 - 25, 2001 [106]Techno-Security 2001 Myrtle Beach, SC, USA April 24 - 26, 2001 [107]Infosecurity Europe 2001 London, Britain, UK May 13 - 16, 2001 [108]2001 IEEE Symposium on Security Oakland, CA, USA May 13 - 16, 2001 [109]CHES 2001 Paris, France May 29, 2001 [110]Security of Mobile Multiagent Systems(SEMAS-2001) Montreal, Canada May 31 - June 1, 2001 [111]The first European Electronic Signatures Summit London, England, UK June 1 - 3, 2001 [112]Summercon 2001 Amsterdam, Netherlands June 4 - 8, 2001 [113]TISC 2001 Los Angeles, CA, USA June 5 - 6, 2001 [114]2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop United States Military Academy, Westpoint, New York, USA June 11 - 13, 2001 [115]7th Annual Information Security Conference: Securing the Infocosm: Security, Privacy and Risk Orlando, FL, USA. June 17 - 22, 2001 [116]13th Annual Computer Security Incident Handling Conference (FIRST 2001) Toulouse, France For additional security-related events, included training courses (which we don't list above) and events further in the future, check out Security Focus' [117]calendar, one of the primary resources we use for building the above list. To submit an event directly to us, please send a plain-text message to [118]lwn@lwn.net. Section Editor: [119]Liz Coolbaugh April 19, 2001 [120]Click Here Secured Distributions: [121]Engarde Secure Linux [122]Immunix [123]Nexus [124]SLinux [125]NSA Security Enhanced [126]Trustix Security List Archives [127]Bugtraq Archive [128]Firewall Wizards Archive [129]ISN Archive Distribution-specific links [130]Caldera Advisories [131]Conectiva Updates [132]Debian Alerts [133]Kondara Advisories [134]Esware Alerts [135]LinuxPPC Security Updates [136]Mandrake Updates [137]Red Hat Errata [138]SuSE Announcements [139]Yellow Dog Errata BSD-specific links [140]BSDi [141]FreeBSD [142]NetBSD [143]OpenBSD Security mailing lists [144]Caldera [145]Cobalt [146]Conectiva [147]Debian [148]Esware [149]FreeBSD [150]Kondara [151]LASER5 [152]Linux From Scratch [153]Linux-Mandrake [154]NetBSD [155]OpenBSD [156]Red Hat [157]Slackware [158]Stampede [159]SuSE [160]Trustix [161]turboLinux [162]Yellow Dog Security Software Archives [163]munitions [164]ZedZ.net (formerly replay.com) Miscellaneous Resources [165]CERT [166]CIAC [167]Comp Sec News Daily [168]Crypto-GRAM [169]LinuxLock.org [170]Linux Security Audit Project [171]LinuxSecurity.com [172]OpenSSH [173]OpenSEC [174]Security Focus [175]SecurityPortal [176]Next: Kernel [177]Eklektix, Inc. Linux powered! Copyright Л 2001 [178]Eklektix, Inc., all rights reserved Linux (R) is a registered trademark of Linus Torvalds References 1. http://lwn.net/ 2. http://ads.tucows.com/click.ng/pageid=001-012-132-000-000-002-000-000-012 3. http://lwn.net/2001/0419/ 4. http://lwn.net/2001/0419/kernel.php3 5. http://lwn.net/2001/0419/dists.php3 6. http://lwn.net/2001/0419/desktop.php3 7. http://lwn.net/2001/0419/devel.php3 8. http://lwn.net/2001/0419/commerce.php3 9. http://lwn.net/2001/0419/press.php3 10. http://lwn.net/2001/0419/announce.php3 11. http://lwn.net/2001/0419/history.php3 12. http://lwn.net/2001/0419/letters.php3 13. http://lwn.net/2001/0419/bigpage.php3 14. http://lwn.net/2001/0412/security.php3 15. http://lwn.net/2001/0419/a/mkpasswd.php3 16. http://lwn.net/2001/0412/security.php3 17. http://lwn.net/2000/0629/backpage.php3 18. http://lwn.net/2001/0419/a/carko.php3 19. http://lwn.net/2001/0419/a/carko3.php3 20. http://lwn.net/2001/0419/a/carko2.php3 21. http://lwn.net/2001/0419/a/cryptogram.php3 22. http://www.securityfocus.com/news/191 23. http://www.securityfocus.com/frames/?content=/templates/article.html%3Fid%3D191% 26cid%3D5280 24. http://lwn.net/2001/0419/a/netfilter.php3 25. http://lwn.net/2001/0419/a/sec-iptables.php3 26. http://lwn.net/2001/0419/a/samba-2.0.8.php3 27. http://lwn.net/2001/0419/a/trustix-samba2.0.8.php3 28. http://lwn.net/2001/0419/a/deb-samba2.0.8.php3 29. http://lwn.net/2001/0419/a/immunix-samba2.0.8.php3 30. http://lwn.net/2001/0419/a/caldera-samba.php3 31. http://www.securityfocus.com/bid/2576 32. http://lwn.net/2001/0419/a/deb-cfingerd.php3 33. http://lwn.net/2001/0419/a/deb-ctags.php3 34. http://freshmeat.net/projects/bubblemon/ 35. http://lwn.net/2001/0419/a/bubblemon.php3 36. http://lwn.net/2001/0419/a/cyberscheduler.php3 37. http://www.crosswind.com/home.htm 38. http://www.securityfocus.com/bid/2578 39. http://www.securityfocus.com/bid/2574 40. http://www.securityfocus.com/bid/2573 41. http://www.securityfocus.com/bid/2584 42. http://www.securityfocus.com/bid/2579 43. http://lwn.net/2001/0419/a/cisco-catalyst5000.php3 44. http://lwn.net/2001/0412/security.php3#netscapegif 45. http://lwn.net/2001/0419/a/rh-7.1-netscape.php3 46. http://lwn.net/2001/0419/a/im-netscape.php3 47. http://lwn.net/2001/0419/a/con-netscape.php3 48. http://lwn.net/2001/0412/a/rh-netscape.php3 49. http://www.securityfocus.com/bid/2540 50. http://lwn.net/2001/0419/a/krud-ntp.php3 51. http://lwn.net/2001/0419/a/fb-ntp.php3 52. http://lwn.net/2001/0419/a/progeny-ntp.php3 53. http://lwn.net/2001/0412/a/cald-ntpd.php3 54. http://lwn.net/2001/0412/a/con-xntp.php3 55. http://lwn.net/2001/0412/a/deb-ntp.php3 56. http://lwn.net/2001/0412/a/db-ntp-2.php3 57. http://lwn.net/2001/0412/a/engarde-xntp.php3 58. http://lwn.net/2001/0412/a/im-ntp-xntp3.php3 59. http://lwn.net/2001/0412/a/lm-ntp-xntp3.php3 60. http://lwn.net/2001/0412/a/nb-ntp.php3 61. http://lwn.net/2001/0412/a/progeny-ntpd.php3 62. http://lwn.net/2001/0412/a/rh-xntp.php3 63. http://lwn.net/2001/0412/a/sl-xntp.php3 64. http://lwn.net/2001/0412/a/suse-xntp.php3 65. http://lwn.net/2001/0412/a/trustix-xntp.php3 66. http://lwn.net/2001/0412/security.php3#bsdipfilter 67. http://freshmeat.net/releases/45473/ 68. http://www.securityfocus.com/bid/2545 69. http://lwn.net/2001/0419/a/fb-ipfilter.php3 70. http://lwn.net/2001/0412/security.php3#bsdftp 71. http://lwn.net/2001/0419/a/fb-ftp.php3 72. http://lwn.net/2001/0419/a/nb-ftp.php3 73. http://lwn.net/2001/0329/security.php3#kernelptrace 74. http://securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26ti d%3D172196%26fromthread%3D0%26threads%3D1%26start%3D2001-03-25%26end%3D2001-03-3 1%26 75. http://www.linux.org.uk/VERSION/relnotes.2219.html 76. http://www.openwall.com/ 77. http://lwn.net/2001/0419/a/deb-kernel.php3 78. http://lwn.net/2001/0419/a/rh-2.2.19.php3 79. http://lwn.net/2001/0419/a/lm-kernel-adv.php3 80. http://lwn.net/2001/0329/a/im-kernel.php3 81. http://www.linux.org.uk/VERSION/relnotes.2219.html 82. http://lwn.net/2001/0405/a/caldera-backport.php3 83. http://lwn.net/2001/0412/a/trustix-kernel.php3 84. http://lwn.net/2001/0412/a/progeny-ptrace.php3 85. http://lwn.net/2001/0412/a/progeny-ptrace2.php3 86. http://lwn.net/2001/0419/a/openssh-2.5.2p2.php3 87. http://lwn.net/2001/0329/security.php3#openssh 88. http://lwn.net/2001/0322/security.php3#sshpassive 89. http://lwn.net/2001/0419/a/progeny-openssh.php3 90. http://lwn.net/2001/0329/a/lm-openssh.php3 91. http://lwn.net/2001/0329/a/con-openssh.php3 92. http://lwn.net/2001/0329/a/im-openssh.php3 93. http://lwn.net/2001/0329/a/rh-openssh.php3 94. http://lwn.net/2001/0405/a/tr-openssh.php3 95. http://lwn.net/2001/0405/a/rh-openssh2.php3 96. http://www.slackware.com/changelog/current.php?cpu=i386 97. http://lwn.net/2000/1214/security.php3#pico 98. http://www.securityfocus.com/archive/1/150150 99. http://www.securityfocus.com/bid/2097 100. http://lwn.net/2001/0419/a/rh-pine.php3 101. http://lwn.net/2001/0419/a/im-pine.php3 102. http://lwn.net/2001/0419/a/newmailinglists.php3 103. http://lwn.net/2001/0419/security.php3 104. http://lwn.net/2001/0419/a/adoredetection.php3 105. http://lwn.net/2001/0208/a/iC0N.php3 106. http://www.techsec.com/html/Conferences.html 107. http://www.infosec.co.uk/page.cfm 108. http://www.ieee-security.org/TC/sp2001.html 109. http://www.ece.wpi.edu/Research/crypt/ches/start.html 110. http://www.dfki.de/~kuf/semas/ 111. http://www.iqpc.com/cgi-bin/templates/98485262029583740234300003/genevent.html?e vent=1525&topic= 112. http://www.summercon.org/announcements/ 113. http://www.tisc2001.com/ 114. http://www.itoc.usma.edu/Workshop/2001/Workshop2001.htm 115. http://www.gartner.com/IndexHomePage.jsp?landPage=/2_events/conferences_briefing s/conferences/sec7.jsp 116. http://www.first.org/conference/2001/ 117. http://securityfocus.com/calendar 118. mailto:lwn@lwn.net 119. mailto:lwn@lwn.net 120. http://ads.tucows.com/click.ng/buttonpos=lwnbuttonsecurity 121. http://www.engardelinux.org/ 122. http://www.immunix.org/ 123. http://Nexus-Project.net/ 124. http://www.slinux.org/ 125. http://www.nsa.gov/selinux/ 126. http://www.trustix.com/ 127. http://www.securityfocus.com/bugtraq/archive/ 128. http://www.nfr.net/firewall-wizards/ 129. http://www.jammed.com/Lists/ISN/ 130. http://www.calderasystems.com/support/security/ 131. http://www.conectiva.com.br/atualizacoes/ 132. http://www.debian.org/security/ 133. http://www.kondara.org/errata/k12-security.html 134. http://www.esware.com/actualizaciones.html 135. http://linuxppc.org/security/advisories/ 136. http://www.linux-mandrake.com/en/fupdates.php3 137. http://www.redhat.com/support/errata/index.html 138. http://www.suse.de/security/index.html 139. http://www.yellowdoglinux.com/resources/errata.shtml 140. http://www.BSDI.COM/services/support/patches/ 141. http://www.freebsd.org/security/security.html 142. http://www.NetBSD.ORG/Security/ 143. http://www.openbsd.org/security.html 144. http://www.calderasystems.com/support/forums/announce.html 145. http://www.cobalt.com/support/resources/usergroups.html 146. http://distro.conectiva.com.br/atualizacoes/ 147. http://www.debian.org/MailingLists/subscribe 148. http://www.esware.com/lista_correo.html 149. http://www.freebsd.org/handbook/eresources.html#ERESOURCES-MAIL 150. http://www.kondara.org/mailinglist.html.en 151. http://l5web.laser5.co.jp/ml/ml.html 152. http://www.linuxfromscratch.org/services/mailinglistinfo.php 153. http://www.linux-mandrake.com/en/flists.php3 154. http://www.netbsd.org/MailingLists/ 155. http://www.openbsd.org/mail.html 156. http://www.redhat.com/mailing-lists/ 157. http://www.slackware.com/lists/ 158. http://www.stampede.org/mailinglists.php3 159. http://www.suse.com/en/support/mailinglists/index.html 160. http://www.trustix.net/support/ 161. http://www.turbolinux.com/mailman/listinfo/tl-security-announce 162. http://lists.yellowdoglinux.com/ydl_updates.shtml 163. http://munitions.vipul.net/ 164. http://www.zedz.net/ 165. http://www.cert.org/nav/alerts.html 166. http://ciac.llnl.gov/ciac/ 167. http://www.MountainWave.com/ 168. http://www.counterpane.com/crypto-gram.html 169. http://linuxlock.org/ 170. http://lsap.org/ 171. http://linuxsecurity.com/ 172. http://www.openssh.com/ 173. http://www.opensec.net/ 174. http://www.securityfocus.com/ 175. http://www.securityportal.com/ 176. http://lwn.net/2001/0419/kernel.php3 177. http://www.eklektix.com/ 178. http://www.eklektix.com/ --- ifmail v.2.14.os7-aks1 * Origin: Unknown (2:4615/71.10@fidonet) Вернуться к списку тем, сортированных по: возрастание даты уменьшение даты тема автор
Архивное /ru.linux/20308bb96c940.html, оценка из 5, голосов 10
|