Server Security - Page 36

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Server Security News

Wrapping Up DJBDNS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Welcome to the home stretch, my last [2] ITworld article on installing DJBDNS. I'll cover two things here. First, I'll show you how to 'import' your existing BIND zones into tinydns data format so you don't need to convert those files by hand. Lastly, I'll show you how to start up the axfrdns server, which will allow DNS secondaries running BIND to mirror your DNS zones.. . .

xinetd: Update: File descriptor leak vulnerability

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

xinetd version 2.3.7 was released that addresses a mior file descriptor leak present in 2.3.4 - 2.3.6. Steve Grubb, co-maintainer of xinetd, sent in a note stating, "At the most, if everything is in just the right configuration...which is probably rare, all they can do is terminate xinetd." . . .

XML Web services need a firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Today, application integration is the single biggest challenge facing IT organizations. With business imperatives driving an increasing need for cross-organization integration, this challenge is getting ever more complex. XML Web services is a term referring to a set of related . . .

XML Security: A Who's Who

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

When a standard is deployed as openly as XML, businesses are bound to have security concerns. The need to control content's distribution and ensure its integrity keeps many companies from deploying XML without an extranet. Proposed standards will address security . . .

Linux: Feelin' Secure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

TechWeb summarizes the recent articles they have published on security Linux distributions including EnGarde, the Editor's Choice, HP Secure Linux and Immunix. " IT pros navigating a minefield of insecure software and systems are finding safe ground in Linux. That's . . .

Squid Vulnerability: Insecure forwarding of proxy_auth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Vendors have not issued updates yet for a vulnerability just reported by the Squid Project. "Under some conditions Squid may forward the proxy authentication credentails. This can happen if you normally require your users to log in to use the proxy, but allow some sites to be reached without needing to log in.". . .

Securing Small Networks with OpenBSD Part 5

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Watching pf logs can be exciting for the first few hours, but it soon becomes a boring activity best left to the machines. But first we need to know how OpenBSD manages pf logs. The pf packet logging mechanism uses the standard system logger daemon syslogd to store packet information in /var/log/pflog.. . .

VPN Implementation in Cluster Computing

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

VPNs often are heralded as one of the most cutting-edge, cost-saving solutions to various applications, and they are widely deployed in the areas of security, infrastructure expansion and inter-networking. A VPN adds more dimension to networking and infrastructure because it enables . . .

Apache Security Release Available

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"This version of Apache is principally a security and bug fix release. A summary of the bug fixes is given at the end of this document. Of particular note is that 1.3.26 addresses and fixes the issues noted in CAN-2002-0392 (mitre.org) [CERT VU#944335] regarding a vulnerability in the handling of chunked transfer encoding.. . .

Apache httpd: vulnerability with chunked encoding

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While testing for Oracle vulnerabilities, Mark Litchfield discovered a denial of service attack for Apache on Windows. Investigation by the Apache Software Foundation showed that this issue has a wider scope, which on some platforms results in a denial of service vulnerability, while on some other platforms presents a potential a remote exploit vulnerability.. . .

NSA gets Linux secure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security is one of the highest profile issues in IT and there has been constant baiting between the Microsoft and Linux camps over who has the more secure operating system. At the start of the year we saw Bill Gates wake up to the fact that security is a good thing and now there is news that the US National Security Agency has been working on a security module that plugs straight into a Linux distribution.. . .

An Idea To Can the Spam

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The problem is that filters do not always prevent mail from bad sources, and the whole "opt-in" farce has resulted in spammers sending whatever messages they want. Yahoo, MSN and many other free (and even paid) e-mail services seem to be repositories for spammers. Even when customers pony up dollars for better accounts, the results are often the same.. . .

The New [Debian] Security Build Infrastructure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"So, there's probably a whole bunch of people out there who're interested in the form new security infrastructure will take. So, what's the solution? Converting security.debian.org to be run by katie [and] Modifiying the central wanna-build infrastructure to do "Accepted-Autobuilding". Read more below.. . .