550 lines
10 KiB
HTML
550 lines
10 KiB
HTML
<HTML
|
|
><HEAD
|
|
><TITLE
|
|
>Security Sources</TITLE
|
|
><META
|
|
NAME="GENERATOR"
|
|
CONTENT="Modular DocBook HTML Stylesheet Version 1.7"><LINK
|
|
REL="HOME"
|
|
TITLE="Linux Security HOWTO"
|
|
HREF="index.html"><LINK
|
|
REL="PREVIOUS"
|
|
TITLE="What To Do During and After a Breakin"
|
|
HREF="after-breakin.html"><LINK
|
|
REL="NEXT"
|
|
TITLE="Glossary"
|
|
HREF="x1357.html"></HEAD
|
|
><BODY
|
|
CLASS="sect1"
|
|
BGCOLOR="#FFFFFF"
|
|
TEXT="#000000"
|
|
LINK="#0000FF"
|
|
VLINK="#840084"
|
|
ALINK="#0000FF"
|
|
><DIV
|
|
CLASS="NAVHEADER"
|
|
><TABLE
|
|
SUMMARY="Header navigation table"
|
|
WIDTH="100%"
|
|
BORDER="0"
|
|
CELLPADDING="0"
|
|
CELLSPACING="0"
|
|
><TR
|
|
><TH
|
|
COLSPAN="3"
|
|
ALIGN="center"
|
|
>Linux Security HOWTO</TH
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="10%"
|
|
ALIGN="left"
|
|
VALIGN="bottom"
|
|
><A
|
|
HREF="after-breakin.html"
|
|
ACCESSKEY="P"
|
|
>Prev</A
|
|
></TD
|
|
><TD
|
|
WIDTH="80%"
|
|
ALIGN="center"
|
|
VALIGN="bottom"
|
|
></TD
|
|
><TD
|
|
WIDTH="10%"
|
|
ALIGN="right"
|
|
VALIGN="bottom"
|
|
><A
|
|
HREF="x1357.html"
|
|
ACCESSKEY="N"
|
|
>Next</A
|
|
></TD
|
|
></TR
|
|
></TABLE
|
|
><HR
|
|
ALIGN="LEFT"
|
|
WIDTH="100%"></DIV
|
|
><DIV
|
|
CLASS="sect1"
|
|
><H1
|
|
CLASS="sect1"
|
|
><A
|
|
NAME="sources"
|
|
></A
|
|
>11. Security Sources</H1
|
|
><P
|
|
> There are a LOT of good sites out there for Unix security in general
|
|
and Linux security specifically. It's very important to subscribe to
|
|
one (or more) of the security mailing lists and keep current on
|
|
security fixes. Most of these lists are very low volume, and very
|
|
informative.
|
|
</P
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="linuxsecurity"
|
|
></A
|
|
>11.1. LinuxSecurity.com References</H2
|
|
><P
|
|
> The LinuxSecurity.com web site has numerous Linux and open source security
|
|
references written by the LinuxSecurity staff and people collectively around
|
|
the world.
|
|
</P
|
|
><P
|
|
>
|
|
<P
|
|
></P
|
|
><UL
|
|
><LI
|
|
><P
|
|
> <EM
|
|
><A
|
|
HREF="http://www.linuxsecurity.com/vuln-newsletter.html"
|
|
TARGET="_top"
|
|
>Linux Advisory Watch</A
|
|
></EM
|
|
> -- A comprehensive newsletter that outlines the security
|
|
vulnerabilities that have been announced throughout the week. It includes
|
|
pointers to updated packages and descriptions of each vulnerability.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> <EM
|
|
><A
|
|
HREF="http://www.linuxsecurity.com/newsletter.html"
|
|
TARGET="_top"
|
|
>Linux Security Week</A
|
|
></EM
|
|
> --
|
|
The purpose of this document is to provide our readers with a quick summary
|
|
of each week's most relevant Linux security headlines.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> <EM
|
|
><A
|
|
HREF="http://www.linuxsecurity.com/general/mailinglists.html"
|
|
TARGET="_top"
|
|
>Linux Security Discussion List</A
|
|
></EM
|
|
> -- This mailing list is for general security-related questions and comments.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> <EM
|
|
><A
|
|
HREF="http://www.linuxsecurity.com/general/mailinglists.html"
|
|
TARGET="_top"
|
|
>Linux Security Newsletters</A
|
|
></EM
|
|
> -- Subscription information for all newsletters.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> <EM
|
|
><A
|
|
HREF="http://www.linuxsecurity.com/docs/colsfaq.html"
|
|
TARGET="_top"
|
|
>comp.os.linux.security FAQ</A
|
|
></EM
|
|
> -- Frequently Asked Questions with answers for the comp.os.linux.security newsgroup.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> <EM
|
|
><A
|
|
HREF="http://www.linuxsecurity.com/docs/"
|
|
TARGET="_top"
|
|
>Linux Security Documentation</A
|
|
></EM
|
|
> -- A great starting point for information pertaining to Linux and Open Source security.
|
|
</P
|
|
></LI
|
|
></UL
|
|
>
|
|
|
|
</P
|
|
></DIV
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="ftpsites"
|
|
></A
|
|
>11.2. FTP Sites</H2
|
|
><P
|
|
> CERT is the Computer Emergency Response Team. They often send out
|
|
alerts of current attacks and fixes. See <A
|
|
HREF="ftp://ftp.cert.org"
|
|
TARGET="_top"
|
|
>ftp://ftp.cert.org</A
|
|
> for more information.
|
|
</P
|
|
><P
|
|
> ZEDZ (formerly Replay) (<A
|
|
HREF="http://www.zedz.net"
|
|
TARGET="_top"
|
|
>http://www.zedz.net</A
|
|
>)
|
|
has archives of many security programs. Since they are outside
|
|
the US, they don't need to obey US crypto restrictions.
|
|
</P
|
|
><P
|
|
> Matt Blaze is the author of CFS and a great security advocate. Matt's
|
|
archive is available at <A
|
|
HREF="ftp://ftp.research.att.com/pub/mab"
|
|
TARGET="_top"
|
|
>ftp://ftp.research.att.com/pub/mab</A
|
|
>
|
|
</P
|
|
><P
|
|
> <TT
|
|
CLASS="literal"
|
|
>tue.nl</TT
|
|
> is a great security FTP site in the Netherlands.
|
|
<A
|
|
HREF="ftp://ftp.win.tue.nl/pub/security/"
|
|
TARGET="_top"
|
|
>ftp.win.tue.nl</A
|
|
>
|
|
</P
|
|
></DIV
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="websites"
|
|
></A
|
|
>11.3. Web Sites</H2
|
|
><P
|
|
>
|
|
<P
|
|
></P
|
|
><UL
|
|
><LI
|
|
><P
|
|
> The Hacker FAQ is a FAQ about hackers: <A
|
|
HREF="http://www.solon.com/~seebs/faqs/hacker.html"
|
|
TARGET="_top"
|
|
>The Hacker FAQ</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> The COAST archive has a large number of Unix security programs and
|
|
information: <A
|
|
HREF="http://www.cs.purdue.edu/coast/"
|
|
TARGET="_top"
|
|
>COAST</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> SuSe Security Page: <A
|
|
HREF="http://www.suse.de/security/"
|
|
TARGET="_top"
|
|
>http://www.suse.de/security/</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Rootshell.com is a great site for seeing what exploits are currently
|
|
being used by crackers: <A
|
|
HREF="http://www.rootshell.com/"
|
|
TARGET="_top"
|
|
>http://www.rootshell.com/</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> BUGTRAQ puts out advisories on security issues: <A
|
|
HREF="http://www.netspace.org/lsv-archive/bugtraq.html"
|
|
TARGET="_top"
|
|
>BUGTRAQ archives</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> CERT, the Computer Emergency Response Team, puts out advisories on
|
|
common attacks on Unix platforms: <A
|
|
HREF="http://www.cert.org/"
|
|
TARGET="_top"
|
|
>CERT home</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Dan Farmer is the author of SATAN and many other security tools. His
|
|
home site has some interesting security survey information, as well as
|
|
security tools: <A
|
|
HREF="http://www.trouble.org"
|
|
TARGET="_top"
|
|
>http://www.trouble.org</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> The Linux security WWW is a good site for Linux security information:
|
|
<A
|
|
HREF="http://www.aoy.com/Linux/Security/"
|
|
TARGET="_top"
|
|
>Linux Security WWW</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Infilsec has a vulnerability engine that can tell you what
|
|
vulnerabilities affect a specific platform: <A
|
|
HREF="http://www.infilsec.com/vulnerabilities/"
|
|
TARGET="_top"
|
|
>http://www.infilsec.com/vulnerabilities/</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> CIAC sends out periodic security bulletins on common exploits: <A
|
|
HREF="http://ciac.llnl.gov/cgi-bin/index/bulletins"
|
|
TARGET="_top"
|
|
>http://ciac.llnl.gov/cgi-bin/index/bulletins</A
|
|
>
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> A good starting point for Linux Pluggable Authentication modules can
|
|
be found at <A
|
|
HREF="http://www.kernel.org/pub/linux/libs/pam/"
|
|
TARGET="_top"
|
|
>http://www.kernel.org/pub/linux/libs/pam/</A
|
|
>.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> The Debian project has a web page for their security fixes and
|
|
information. It is at <A
|
|
HREF="http://www.debian.com/security/"
|
|
TARGET="_top"
|
|
>http://www.debian.com/security/</A
|
|
>.
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> WWW Security FAQ, written by Lincoln Stein, is a great web
|
|
security reference. Find it at <A
|
|
HREF="http://www.w3.org/Security/Faq/www-security-faq.html"
|
|
TARGET="_top"
|
|
>http://www.w3.org/Security/Faq/www-security-faq.html</A
|
|
>
|
|
</P
|
|
></LI
|
|
></UL
|
|
>
|
|
|
|
</P
|
|
></DIV
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="AEN1324"
|
|
></A
|
|
>11.4. Mailing Lists</H2
|
|
><P
|
|
> Bugtraq: To subscribe to bugtraq, send mail to listserv@netspace.org
|
|
containing the message body subscribe bugtraq. (see links above for
|
|
archives).
|
|
</P
|
|
><P
|
|
> CIAC: Send e-mail to majordomo@tholia.llnl.gov. In the BODY (not
|
|
subject) of the message put (either or both): subscribe ciac-bulletin
|
|
</P
|
|
><P
|
|
>
|
|
Red Hat has a number of mailing lists, the most important of which is
|
|
the redhat-announce list. You can read about security (and other)
|
|
fixes as soon as they come out. Send email to
|
|
redhat-announce-list-request@redhat.com with the Subject Subscribe
|
|
See <A
|
|
HREF="https://listman.redhat.com/mailman/listinfo/"
|
|
TARGET="_top"
|
|
>https://listman.redhat.com/mailman/listinfo/</A
|
|
> for
|
|
more info and archives.
|
|
</P
|
|
><P
|
|
> The Debian project has a security mailing list that covers their
|
|
security fixes. See <A
|
|
HREF="http://www.debian.com/security/"
|
|
TARGET="_top"
|
|
>http://www.debian.com/security/</A
|
|
> for more information.
|
|
</P
|
|
></DIV
|
|
><DIV
|
|
CLASS="sect2"
|
|
><H2
|
|
CLASS="sect2"
|
|
><A
|
|
NAME="AEN1332"
|
|
></A
|
|
>11.5. Books - Printed Reading Material</H2
|
|
><P
|
|
> There are a number of good security books out there. This section
|
|
lists a few of them. In addition to the security specific books,
|
|
security is covered in a number of other books on system
|
|
administration.
|
|
</P
|
|
><P
|
|
>
|
|
<P
|
|
></P
|
|
><UL
|
|
><LI
|
|
><P
|
|
> Building Internet Firewalls By D. Brent Chapman & Elizabeth D. Zwicky,
|
|
1st Edition September 1995,
|
|
ISBN: 1-56592-124-0
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Practical UNIX & Internet Security, 2nd Edition By Simson Garfinkel & Gene Spafford, 2nd Edition April 1996, ISBN: 1-56592-148-8
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Computer Security Basics By Deborah Russell & G.T. Gangemi, Sr., 1st
|
|
Edition July 1991, ISBN: 0-937175-71-4
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Linux Network Administrator's Guide By Olaf Kirch, 1st Edition January
|
|
1995, ISBN: 1-56592-087-2
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> PGP: Pretty Good Privacy By Simson Garfinkel, 1st Edition December 1994,
|
|
ISBN: 1-56592-098-8
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Computer Crime A Crimefighter's Handbook By David Icove, Karl
|
|
Seger & William VonStorch (Consulting Editor Eugene H. Spafford),
|
|
1st Edition August 1995, ISBN: 1-56592-086-4
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Linux Security By John S. Flowers, New Riders; ISBN: 0735700354, March 1999
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Maximum Linux Security : A Hacker's Guide to Protecting Your Linux Server
|
|
and Network, Anonymous, Paperback - 829 pages, Sams; ISBN: 0672313413, July
|
|
1999
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Intrusion Detection By Terry Escamilla, Paperback - 416 pages
|
|
(September 1998), John Wiley and Sons; ISBN: 0471290009
|
|
</P
|
|
></LI
|
|
><LI
|
|
><P
|
|
> Fighting Computer Crime, Donn Parker, Paperback - 526 pages (September
|
|
1998), John Wiley and Sons; ISBN: 0471163783
|
|
</P
|
|
></LI
|
|
></UL
|
|
>
|
|
|
|
</P
|
|
></DIV
|
|
></DIV
|
|
><DIV
|
|
CLASS="NAVFOOTER"
|
|
><HR
|
|
ALIGN="LEFT"
|
|
WIDTH="100%"><TABLE
|
|
SUMMARY="Footer navigation table"
|
|
WIDTH="100%"
|
|
BORDER="0"
|
|
CELLPADDING="0"
|
|
CELLSPACING="0"
|
|
><TR
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="left"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="after-breakin.html"
|
|
ACCESSKEY="P"
|
|
>Prev</A
|
|
></TD
|
|
><TD
|
|
WIDTH="34%"
|
|
ALIGN="center"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="index.html"
|
|
ACCESSKEY="H"
|
|
>Home</A
|
|
></TD
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="right"
|
|
VALIGN="top"
|
|
><A
|
|
HREF="x1357.html"
|
|
ACCESSKEY="N"
|
|
>Next</A
|
|
></TD
|
|
></TR
|
|
><TR
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="left"
|
|
VALIGN="top"
|
|
>What To Do During and After a Breakin</TD
|
|
><TD
|
|
WIDTH="34%"
|
|
ALIGN="center"
|
|
VALIGN="top"
|
|
> </TD
|
|
><TD
|
|
WIDTH="33%"
|
|
ALIGN="right"
|
|
VALIGN="top"
|
|
>Glossary</TD
|
|
></TR
|
|
></TABLE
|
|
></DIV
|
|
></BODY
|
|
></HTML
|
|
> |