Author: Benjamin D. Thomas
checkpolicy, spamassassin, gaim, ruby, arts, kde, util-linux, sudo, gawk, mc,
pilot-link, alsa-utils, jpilot, ImageMagick, hwdata, webapp, cpio, squirrelmail,
and bzip2. The distributors include Fedora, Gentoo, and Red Hat.SPF: Ready for Prime Time, Part II
By: Pete O’Hara
Spammers are Using SPF
At this point in time it’s no big secret that spammers are publishing
their own SPF records to thwart the system and once their domains end
up on a URI block list they throw them away and start with new domains
with new SPF records. There may be future solutions to this such as
“reputation” schemes (i.e. Aspen Framework) to judge a domain
credibility but not at this time.
Why isn’t there a standard for SPF?
The MARID group (MTA Authorization Records in DNS) was created by the IETF
(The Internet Engineering Task Force) to “produce a standard in the area of
DNS-stored policies related to and accessible by MTAs.” Due to a failure to
come to an agreement to a solution the MARID group was dissolved as reported
in an email from the IESG secretary (http://www.imc.org/ietf-mxcomp/mail-archive/msg0
“From the outset, however, the working group participants have had fundamental
disagreements on the nature of the record to be provided and the mechanism by
which it would be checked. Technical discussion of the merits of these mechanisms
has not swayed their proponents, and what data is available on existing deployments
has not made one choice obviously superior. Each represents trade-offs, and
the working group has not succeeded in establishing which trade-offs are the
most appropriate for this purpose. These assessments have been difficult in
part because they have been moved out of the realm of pure engineering by the
need to evaluate IPR and licensing related to at least one proposal in the light
of a variety of licenses associated with the deployed base of MTAs.”
It seems that the problem came down to the “last call” when a proposed
solution (Sender ID) to MARID included PRA (Purported Responsible
Address algorithm) which Microsoft claimed intellectual property rights
to. Microsoft was willing to allow free use but only in conjunction
with a patent license. Most of the MARID participants objected to
this and rightfully so. Many strongly suspected the intention to
gain control over another piece of the industry.
The Future
The future of email sender verification has several possibilities.
Some of which are Yahoo’s “DomainKeys”, Cisco’s “IIM” (Identified
Internet Mail), a mix of both of these referred to as “DKIM”, the
“Aspen Framework” (which incorporates second generation “Unified”
SPF) and CSV (Client SMTP Verification). Here is a brief run down
on these proposals.
Read Entire Article:
http://infocenter.guardiandigital.com/documentati
LinuxSecurity.com
Feature Extras:
Getting
to Know Linux Security: File Permissions – Welcome to the first
tutorial in the ‘Getting to Know Linux Security’ series. The topic explored
is Linux file permissions. It offers an easy to follow explanation of how
to read permissions, and how to set them using chmod. This guide is intended
for users new to Linux security, therefore very simple. If the feedback is
good, I’ll consider creating more complex guides for advanced users. Please
let us know what you think and how these can be improved.The
Tao of Network Security Monitoring: Beyond Intrusion Detection
– To be honest, this was one of the best books that I’ve read on network security.
Others books often dive so deeply into technical discussions, they fail to
provide any relevance to network engineers/administrators working in a corporate
environment. Budgets, deadlines, and flexibility are issues that we must all
address. The Tao of Network Security Monitoring is presented in such a way
that all of these are still relevant.Encrypting
Shell Scripts – Do you have scripts that contain sensitive information
like passwords and you pretty much depend on file permissions to keep it secure?
If so, then that type of security is good provided you keep your system secure
and some user doesn’t have a “ps -ef” loop running in an attempt to capture
that sensitive info (though some applications mask passwords in “ps” output).
Take advantage of our Linux Security discussion
list! This mailing list is for general security-related questions and comments.
To subscribe send an e-mail to security-discuss-request@linuxsecurity.com
with “subscribe” as the subject.
Thank you for reading the LinuxSecurity.com
weekly security newsletter. The purpose of this document is to provide our readers
with a quick summary of each week’s most relevant Linux security headline.
Fedora | ||
Fedora Core 4 Update: elinks-0.10.3-3.1 | ||
16th, June, 2005
|
||
Fedora Core 4 Update: mikmod-3.1.6-35.FC4 | ||
16th, June, 2005
|
||
Fedora Core 4 Update: tcpdump-3.8.2-13.FC4 | ||
16th, June, 2005
|
||
Fedora Core 4 Update: parted-1.6.22-3.FC4 | ||
16th, June, 2005
|
||
Fedora Core 4 Update: system-config-securitylevel-1.5.8.1-1 | ||
16th, June, 2005
|
||
Fedora Core 3 Update: checkpolicy-1.17.5-1.2 | ||
16th, June, 2005
|
||
Fedora Core 3 Update: selinux-policy-targeted-1.17.30-3.9 | ||
16th, June, 2005
|
||
Fedora Core 3 Update: spamassassin-3.0.4-1.fc3 | ||
16th, June, 2005
|
||
Fedora Core 4 Update: spamassassin-3.0.4-1.fc4 | ||
16th, June, 2005
|
||
Fedora Core 3 Update: gaim-1.3.1-0.fc3 | ||
16th, June, 2005
|
||
Fedora Core 4 Update: gaim-1.3.1-0.fc4 | ||
16th, June, 2005
|
||
Fedora Core 4 Update: ruby-1.8.2-7.fc4.1 | ||
16th, June, 2005
|
||
Fedora Core 3 Update: ruby-1.8.2-1.fc3.2 | ||
16th, June, 2005
|
||
Fedora Core 4 Update: arts-1.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdelibs-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdebase-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdemultimedia-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdesdk-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdeaccessibility-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdeaddons-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdeartwork-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdebindings-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdeedu-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdegames-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdegraphics-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdenetwork-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdepim-3.4.1-0.fc4.2 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdeutils-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdevelop-3.2.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdewebdev-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kdeadmin-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: kde-i18n-3.4.1-0.fc4.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: util-linux-2.12p-9.5 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: sudo-1.6.8p8-2.1 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: gawk-3.1.4-5.2 | ||
17th, June, 2005
|
||
Fedora Core 3 Update: util-linux-2.12a-24.3 | ||
17th, June, 2005
|
||
Fedora Core 4 Update: mc-4.6.1a-0.10.FC4 | ||
20th, June, 2005
|
||
Fedora Core 4 Update: pilot-link-0.12.0-0.pre3.0.fc4.1 | ||
20th, June, 2005
|
||
Fedora Core 4 Update: selinux-policy-targeted-1.23.18-12 | ||
20th, June, 2005
|
||
Fedora Core 4 Update: alsa-lib-1.0.9rf-2.FC4 | ||
21st, June, 2005
|
||
Fedora Core 4 Update: alsa-utils-1.0.9rf-2.FC4 | ||
21st, June, 2005
|
||
Fedora Core 4 Update: system-config-soundcard-1.2.12-2 | ||
21st, June, 2005
|
||
Fedora Core 4 Update: jpilot-0.99.8-0.pre9.fc4.1 | ||
21st, June, 2005
|
||
Fedora Core 3 Update: ruby-1.8.2-1.fc3.3 | ||
21st, June, 2005
|
||
Fedora Core 4 Update: ruby-1.8.2-7.fc4.2 | ||
21st, June, 2005
|
||
Fedora Core 4 Update: ImageMagick-6.2.2.0-3.fc4.0 | ||
21st, June, 2005
|
||
Fedora Core 3 Update: sudo-1.6.7p5-30.3 | ||
21st, June, 2005
|
||
Fedora Core 4 Update: sudo-1.6.8p8-2.2 | ||
21st, June, 2005
|
||
Fedora Core 4 Update: hwdata-0.158.1-1 | ||
22nd, June, 2005
|
||
Gentoo | ||
Gentoo: webapp-config Insecure temporary file handling |
||
17th, June, 2005
|
||
Gentoo: Sun and Blackdown Java Applet privilege escalation |
||
19th, June, 2005
|
||
Gentoo: PeerCast Format string vulnerability | ||
19th, June, 2005
|
||
Gentoo: cpio Directory traversal vulnerability | ||
19th, June, 2005
|
||
Gentoo: SpamAssassin 3, Vipul’s Razor Denial of Service vulnerability |
||
21st, June, 2005
|
||
Gentoo: Tor Information disclosure | ||
21st, June, 2005
|
||
Gentoo: SquirrelMail Several XSS vulnerabilities | ||
21st, June, 2005
|
||
Gentoo: Cacti Several vulnerabilities | ||
22nd, June, 2005
|
||
Gentoo: Trac File upload vulnerability | ||
22nd, June, 2005
|
||
Gentoo: sudo Arbitrary command execution | ||
23rd, June, 2005
|
||
Red Hat |
||
RedHat: Low: bzip2 security update | ||
16th, June, 2005
|
||
RedHat: Moderate: mc security update | ||
16th, June, 2005
|
||
RedHat: Moderate: gaim security update | ||
16th, June, 2005
|
||