This week, perhaps the most interesting articles include "Keychain: Openssh Key Management," "," and "Putting Patch Management in Perspective."


EnGarde Secure Linux 3.0 - Download Now!

  • Linux 2.6 kernel featuring SELinux Mandatory Access Control
  • Guardian Digital Secure Network features free access to all system and security updates (to be available shortly through an updated release)
  • Support for new hardware, including 64-bit AMD architecture
  • Web-based management of all functions, including the ability to build a complete web presence with FTP, DNS, HTTP, SMTP and more.
  • Apache v2.0, BIND v9.3, MySQL v5.0(beta)
  • Completely new WebTool, featuring easier navigation and greater ability to manage the complete system
  • Integrated firewall with ability to manage individual firewall rules, control port forwarding, and creation of IP blacklists
  • Built-in UPS configuration provides ability to manage an entire network of battery-backup devices
  • RSS feed provides ability to display current news and immediate access to system and security updates
  • Real-time access to system and service log information

LEARN MORE:
https://guardiandigital.com/cloud-email-security


LINUX ADVISORY WATCH - This week, advisories were released for Ruby, hylafax, Mozilla, module-assistant, Lynx, phpMyAdmin, AbiWord, netpbm, gdb, xloadimage, and openldap. The distributors include Debian, Gentoo, and Red Hat.

LinuxSecurity.com Feature Extras:

Linux File & Directory Permissions Mistakes - One common mistake Linux administrators make is having file and directory permissions that are far too liberal and allow access beyond that which is needed for proper system operations. A full explanation of unix file permissions is beyond the scope of this article, so I'll assume you are familiar with the usage of such tools as chmod, chown, and chgrp. If you'd like a refresher, one is available right here on linuxsecurity.com.

Introduction: Buffer Overflow Vulnerabilities - Buffer overflows are a leading type of security vulnerability. This paper explains what a buffer overflow is, how it can be exploited, and what countermeasures can be taken to prevent the use of buffer overflow vulnerabilities.

Getting to Know Linux Security: File Permissions - Welcome to the first tutorial in the 'Getting to Know Linux Security' series. The topic explored is Linux file permissions. It offers an easy to follow explanation of how to read permissions, and how to set them using chmod. This guide is intended for users new to Linux security, therefore very simple.


Bulletproof Virus Protection - Protect your network from costly security breaches with Guardian Digital’s multi-faceted security applications. More then just an email firewall, on demand and scheduled scanning detects and disinfects viruses found on the network. Click to find out more!

Take advantage of our Linux Security discussion list! This mailing list is for general security-related questions and comments. To subscribe send an e-mail to This email address is being protected from spambots. You need JavaScript enabled to view it. with "subscribe" as the subject.

Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headline.


Keychain - Openssh Key Management
27th, October, 2005

Ever since networking came out, one important issue, to a various extent over the time, has been how to give the legitimate users the right access - authentication, which is one of the three basic elements in security: authentication, authorization and access control.

news/cryptography/keychain-openssh-key-management

Security Book Contest
27th, October, 2005

We are giving away the following titles: Rootkits: Subverting the Windows Kernel, Real Digital Forensics, Cryptography in the Database, Extrusion Detection, Secure Coding in C and C++, Data Protection and Information Lifecycle Management.

(IN)SECURE Magazine Issue 4 is Available
28th, October, 2005

The fourth issue of (IN)SECURE, a free digital security magazine published in PDF format, has been released.

Welcome to yet another issue of (IN)SECURE. The book contest we held in the previous issue was a great success and here are the winners: Dominic White, Dr. Gary Hinson, Ronaldo Vasconcellos, Joey Ortiz, Adrian St. Onge and Frantisek Holop. To all of you that sent us insightful comments we thank you, (IN)SECURE will grow to be better because of it. Expect more contests in the future and keep that feedback running, there’s always place for us to improve. If you’re interested in writing for (IN)SECURE feel free to contact us, we take a look at all submissions and ideas.

Help's A Firewall Away
24th, October, 2005

Flash back to December 2002. Barely in his 20s, self-taught network engineer and help-desk staffer Joel Bomgaars is frustrated because firewalls prevent him from accessing PCs of users needing help. At his cubical at systems integrator Business Communications Inc., he has an epiphany: Instead of accessing the user's computer, have the user request help by going to a Web site. That would clear the firewall hurdles, because firewalls only block incoming messages. The idea worked, and Bomgaars was able to connect with a user within 10 seconds.

news/firewall/helps-a-firewall-away

Two Factor Authentication Systems?
27th, October, 2005

I've been given a project to undertake that involves setting our internal network systems up to have two factor authentication. I need suggestions to take in front of our CIO that shows how the security model works, cost vs benefit/features, and the different options. At this point, the name brand is RSA and I'm pressed to find any others even though I've done looking around.

VOIP may be vulnerable to barrage of threats
25th, October, 2005

Is enterprise VoIP (voice over IP) due for a security wakeup call or are the threats mostly exaggerated? It depends on who's talking. "The security aspects of enterprise VoIP have been overblown," says Irwin Lazar, senior analyst at the Burton Group. "There's a lot more attention being paid to the fear of attack than what is actually possible."

news/network-security/voip-may-be-vulnerable-to-barrage-of-threats

Hotrod Your Linksys WAP with Linux
26th, October, 2005

A lot of Linux geeks are master scroungers, because Linux is so adaptable that old AMDs, classic Pentiums and even 386es and 486es can be put to use in some way. It's a shame to throw away old equipment when it can be repurposed as networking devices like firewalls, authentication servers and routers. But as fun as it is to recycle, I'll wager I'm not the only who has gazed upon shiny new devices like the Linksys WRT54G and sighed "Wouldn't that be a great device for my network! It is small, cheap, and uses little power.

news/network-security/hotrod-your-linksys-wap-with-linux

OSSEC HIDS v0.4 available - log analysis, rootkit detection and integrity checking
27th, October, 2005

Version 0.4 of the OSSEC HIDS is now available. OSSEC HIDS is an Open source Host-based intrusion detection software. It performs log analysis, integrity checking, rootkit detection and health monitoring. All this information is correlated and analyzed by a single engine, creating a very powerfull detection tool. OSSEC HIDS is very scalable, allowing you to easily monitor multiple systems from a central server. This new version includes a new rootkit detection system, an improved integrity detection engine (much more complete and with much more detailed alerts), a faster and powerfull analysis system and complete support to Solaris and MacOS (in addition to Linux, *BSD, etc).

Gartner event focuses on security
24th, October, 2005

With many keeping one eye on Hurricane Wilma churning off the coast, 6,000 IT executives last week heard Gartner analysts offer their vision on everything from security trends to wireless network directions. The Gartner Symposium and IT Expo 2005 also brought out 190 vendors and included keynote presentations from Microsoft CEO Steve Ballmer, HP CEO Mark Hurd and Dell CEO Michael Dell.

news/organizations-events/gartner-event-focuses-on-security

Putting Patch Management in Perspective
25th, October, 2005

Whether scanning and patching “vulnerable