![[LWN Logo]](/images/lcorner.png) |
|
![[LWN.net]](/images/Included.png) |
From: InfoSec News <isn@c4i.org>
To: isn@attrition.org
Subject: [ISN] Linux Security Week - September 3rd 2001
Date: Tue, 4 Sep 2001 04:16:49 -0500 (CDT)
+---------------------------------------------------------------------+
| LinuxSecurity.com Weekly Newsletter |
| September 3rd, 2001 Volume 2, Number 35n |
| |
| Editorial Team: Dave Wreski dave@linuxsecurity.com |
| Benjamin Thomas ben@linuxsecurity.com |
+---------------------------------------------------------------------+
Thank you for reading the LinuxSecurity.com weekly security newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's most relevant Linux security headlines.
This week, perhaps the most interesting articles include "Network
Monitoring for Intrusion Detection," "Linux Running on Secure
Cryptographic Coprocessor," and "Thinking about Security." Also this
week, we are proud to announce our new look and new features available at
LinuxSecurity.com.
LinuxSecurity.com: New Look, New Features! After an extensive period of
planning and development, LinuxSecurity.com contributors have over the
last several months added easier navigation ability, integration with our
local high-speed Packetstorm Security mirror, and much more.
http://www.linuxsecurity.com/feature_stories/feature_story-92.html
EnGarde Secure Newswire - Aug/Sept 2001 Read on for the latest news and
reviews, information for EnGarde developers, the best QuickTips of the
month, info from Guardian Digital on the future of EnGarde, and how to get
started using EnGarde if you're new to the world of secure Linux
computing!
http://www.engardelinux.org/news/newswire-09-en.html
Take advantage of our Linux Security discussion list! This mailing list
is for general security-related questions and comments. To subscribe send
an e-mail to security-discuss-request@linuxsecurity.com with "subscribe"
as the subject.
This week, advisories were released for sendmail, telnet (who's still
using this?), xloadimage, Mandrake kernel, xinetd, openldap, apache,
openssl, and lpd. The vendors include Caldera, Conectiva, FreeBSD,
Immunix, Mandrake, and Slackware. The recent sendmail problem has
prompted many vendors to act quickly. If the distribution that you use is
not listed, be watching for further updates.
http://www.linuxsecurity.com/articles/forums_article-3600.html
HTML Version:
http://www.linuxsecurity.com/vuln-newsletter.html
+---------------------+
| Host Security News: | <<-----[ Articles This Week ]-------------
+---------------------+
* Thinking about Security
September 1st, 2001
This month, I thought I'd take a slight detour to talk about security. The
Code Red worm and its sequels have been in the news a great deal, and
admins running *Nix servers and Apache might be getting a little
complacent in the security department, figuring that all is well as long
as they're not running IIS
http://www.linuxsecurity.com/articles/general_article-3605.html
* Review: Real World Linux Security: Intrusion Prevention, Detection,
and Recovery
August 30th, 2001
Toxen is one of the original developers of Berkeley Unix, and his book is
full of interesting historical tidbits from the computer science halls of
UC Berkeley in the early 1970s. When it comes to Unix security, Toxen's
mantra is certainly "been there, done that." Toxen is one of a very few
writers who can write in the first person about developing operating
systems while dropping names such as Bill Joy and Ken Thompson.
http://www.linuxsecurity.com/articles/documentation_article-3597.html
+------------------------+
| Network Security News: |
+------------------------+
* NASA uses OpenBSD; overcomes 802.11b security flaws
September 1st, 2001
The network security group in the NASA Advanced Supercomputing (NAS)
Division at Ames Research Center, in California's Silicon Valley uses
OpenBSD and other open source software for its wireless firewall gateway
implementation. They successfully installed a secure interoperable
wireless network addressing the well-known problems of the 802.11b
standard wireless systems.
http://www.linuxsecurity.com/articles/network_security_article-3606.html
* AirSnort: Wireless Networks Beware!
August 30th, 2001
Laptop users, beware: a new program allowing hackers to grab data
transmitted through the air could compromise most wireless Internet
networks used in airports, hotels, hospitals and colleges. AirSnort,
which was released on the Internet last week, exploits flaws in the
encryption used to secure traffic on the standard network, known as Wi-Fi
or 802.11b.
http://www.linuxsecurity.com/articles/network_security_article-3594.html
* VPN firewalls standard in the pipeline
August 30th, 2001
In a bid to make it easier for firewalls to interoperate with virtual
private networks (VPNs), the Internet Engineering Task Force (IETF) is
considering a standard for network address translation (Nat). At a recent
meeting in London, the IETF reviewed a proposed standard for Nat that
would determine how IP Security VPN tunnels should pass through firewalls
and other Nat devices.
http://www.linuxsecurity.com/articles/cryptography_article-3599.html
* Future IP Security, part I
August 28th, 2001
Anton Chuvakin writes "This article outlines the future of IP addressing
(IPv6) and focuses on the security components of next generation IP
services (IPsec). We list major components of IPsec and describe their
functionality in terms of the security services they provide. Part II will
be devoted to end-user issues with IPsec protocols and their common
implementations."
http://www.linuxsecurity.com/articles/network_security_article-3576.html
* Network Monitoring for Intrusion Detection
August 28th, 2001
In the world of intrusion detection, we tend to focus on detecting attacks
and clearly anomalous activity. However, another important component of a
complete intrusion detection solution is basic network monitoring and
traffic analysis. Network monitoring collects information on connections,
while traffic analysis allows us to see what services are being used on a
network and to compare that against the activity that we should be seeing.
This allows us to identify unauthorized services being used within a
network, as well as gaps in network perimeter defenses.
http://www.linuxsecurity.com/articles/intrusion_detection_article-3582.html
+------------------------+
| Cryptography News: |
+------------------------+
* Linux Running on Secure Cryptographic Coprocessor
August 31st, 2001
By running Linux, it enables much easier migration and porting of
applications into the secure environment than with the current CP/Q
operating system. As a key product for secure e-business, its main
applications are financial-related solutions, such as electronic coupon
dispensers, Internet postage meters, intellectual property protection (web
subscription services), signatures for digital documents and certificate
authorities.
http://www.linuxsecurity.com/articles/cryptography_article-3601.html
* Two men arrested for planning to smuggle high-tech encryption
August 30th, 2001
Two men have been arrested and accused of scheming to smuggle military
encryption technology to China, the Customs Service said Wednesday. The
technology, two devices known as KIV-7HS units, are used to encode
classified government communications.
http://www.linuxsecurity.com/articles/government_article-3595.html
+------------------------+
| General Security News: |
+------------------------+
* Boards fail the security test
September 2nd, 2001
Businesses need to work harder on their e-business security in the wake of
a report saying two-thirds have been attacked in some way. Company boards
should do more to improve e-business security, as digital crime is
deterring many firms from selling goods and services over the Internet,
according to a recent report.
http://www.linuxsecurity.com/articles/organizations_events_article-3608.html
* Security software: blind lead blind
September 1st, 2001
It's incredible that in this day and age some of the most popular security
products, products that are marketed as protecting you from the evils of
computers, are so badly designed. CheckPoint's FireWall-1, the leading
firewall by market share, had at least four vulnerabilities reported this
year, and at least eleven reported last year.
http://www.linuxsecurity.com/articles/vendors_products_article-3607.html
* Security market: A double edged sword
August 30th, 2001
According to IDC, the security market is going to grow from strength from
strength over the next four years, rising at a compound annual rate of 23,
until it tops more than $14 billion in 2005. This isn't just for virus
protection either -which seems to be an increasingly virulent threat - but
for all sectors of the security industry: firewalls, encryption,
authentication authorisation and administration.
http://www.linuxsecurity.com/articles/general_article-3598.html
* CERT Summary CS-2001-03
August 29th, 2001
Since the last regularly scheduled CERT summary, issued in May 2001
(CS-2001-02), we have seen several self-propagating worms, as well as
active exploitation of vulnerabilities in Solaris in.lpd, BSD telnet
daemon and Microsoft IIS by intruders. In addition, we have seen an
increase in intruder activity directed at home users.
http://www.linuxsecurity.com/articles/network_security_article-3587.html
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
To unsubscribe email newsletter-request@linuxsecurity.com
with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
-
ISN is currently hosted by Attrition.org
To unsubscribe email majordomo@attrition.org with 'unsubscribe isn' in the BODY
of the mail.