Cover V05, I12
Article

dec96.tar


Internet Security Information Sources

William Steen and Emmett Dulaney

Keeping up to date on the latest in security trends and breaches can be a laborsome job for a system administrator. Such concerns become especially high priorities when part of your network is exposed through an Internet connection associated with a Web server. Fortunately, there are a number of organizations that specialize in providing users with bulletins and advice on Internet security. They are basically divided between government-sponsored groups such as the Computer Emergency Response Team (CERT), university organizations, such as COAST, and vendors. All of these organizations can help you protect your systems or deal with intrusions. Vendors typically offer free security bulletins to recipients of the appropriate mailing list, along with a Web/ftp archive of previous bulletins.

This article provides a review of the major sites of interest that readers may find useful, and a listing of pertinent security-related RFCs.

AT&T

For information on research being conducted at AT&T - including the new (so-called) java-killer language, Inferno, (and its operating system counterpart, Inferno), check out the Web site at http://www.research.att.com/ or the ftp site at ftp://Research.att.com/dist/internet_security.

bugtraq

bugtraq is a popular mailing list that involves detailed discussion of Unix vulnerabilities. The amount of email traffic generated by this source is quite substantial. To subscribe, send the text subscribe bugtraq to: listserv@netspace.org.

CERT

The U.S. Computer Emergency Response (CERT) Team was founded in 1989 by the U.S. Department of Defense to protect the infrastructure of the Internet. Situated at Carnegie-Mellon University, in Pittsburgh, Pennsylvania, CERT consists of about a dozen employees who respond to reports from Internet users regarding network security, issuing bulletins, notifying vendors, characterizing the state of the Internet from a security standpoint, working with the mass media to publicize and address concerns, and researching solutions to Internet security problems. CERT is frequently mentioned in media reports from publications such as the New York Times and Scientific American.

CERT has one of the largest mailing lists for security advisories, with more than 100,000 subscribers. Anyone can subscribe. The CERT ftp archive contains a wide range of security programs, as well as every advisory and bulletin that CERT has issued.

The CERT group recommends encrypting security information before emailing; they support DES, PGP, and PEM. They have a 24-hour hotline at (412) 268-7090. CERT advisories are posted on comp.security.announce. The ftp address is ftp://info.cert.org; email: cert@cert.org.

CIAC

The U.S. Department of Energy's Computer Incident Advisory Capability (CIAC) group was created in 1989 in response to the Internet Worm. It primarily serves the Department of Energy from its Lawrence Livermore National Laboratory site, but also provides email advisories and an ftp/Web site for anyone on the Internet. The Web offers advisories, security documents, and ftp links to many significant programs.

The ftp address is ftp://ciac.llnl.gov/pub/ciac. The Web address is http://ciac.llnl.gov; email: ciac@llnl.gov.

COAST

The Purdue University COAST project was founded by Eugene Spafford. It stands for Computer Operations, Audit, and Security Technology and is dedicated to improving network security. The COAST Web site features links to large numbers of security sites. There is also a comprehensive ftp archive and one of the largest collections of papers and tools on the topic of network security.

COAST also issues a newsletter, works closely with major companies and government agencies, and has created a number of useful tools. The ftp address is: ftp://coast.cs.purdue.edu. The Web site is: http://www.cs.purdue.edu/coast/coast.html; email: coast-request@cs.purdue.edu.

Cygnus

Cygnus is a vendor of GNU and Keberos-related products and services. For information on Kerberos, go to the Web site http://www.cygnus.com/data/cns. Additional Kerberos information can be obtained from MIT at: ftp://athena-dist.mit.edu \ /pub/ATHENA.

8lgm - Eight Little Green Men

This mailing list sends out advisories and exploit scripts for Unix vulnerabilities. They frequently adhere to full disclosure on security holes, so they are one of the best sources for understanding the source of vulnerabilities.

To subscribe, send the text subscribe 8lgm-list to: majordomo@8lgm.org.

FIRST

The Forum of Incident and Response Security Teams, or FIRST, is a non-profit corporation of representatives from the vendors, universities, national and international government agencies, and large private corporate computer users. A complete list of members (currently 45 groups), along with contact information, is available. CERT redirects requests regarding security problems to the appropriate FIRST member, so that FIRST can address the issue and provide resolution information to CERT for advisories or bulletins.

FIRST provides a forum for security response teams to share security information, tools, and practices. FIRST sponsors a yearly week-long meeting of representatives, a mailing list for discussions among members, and a point of contact for Internet users with security concerns.

The ftp address is: ftp://csrc.ncsl.nist.gov/pub/first. The email address is first-sec@first.org, and the web address is: http://www.first.org/first/.

News Groups

The newsgroups shown below are excellent day-to-day sources of information for security-minded people, whether novice or expert. Investigate them all to start, and stay with the ones you find most useful.

comp.security.unix           The primary newsgroup for security
information
comp.security.misc           A great newsgroup for
security-related information
alt.security                 Increasingly becoming one of the
most widely frequented
sci.crypt                    Theory on cryptography
alt.2600                     Concentrates on phone hacking and
vending machine breaking
comp.security.firewalls      Discusses firewalls
comp.security.announce       CERT advisories
alt.security.pgp             Discusses of PGP
alt.security.ripem           Discusses PEM
comp.protocols.kerberos      Discusses Kerberos
alt.hacker                   Self-explanatory
talk.politics.crypto         Cryptography

PGP

PGP-related information and utilities are available from a number of sources, including:

PGP and IDEA Archives:

ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/disk
ftp://ftp.dsi.unimi.it:/pub/security/crypt/code
http://www.ifi.uio.no/~staalesc/PGP/home.html
http://web.mit.edu/network/pgp-form.html

PGP Documentation:

http://www.pegasus.esprit.ec.org/people/arne/pgp.html

PGP elm:

ftp://ftp.viewlogic.com/pub/elm2.4pl24pgp2.tar.gz

PGP Public Key Server:

http://www-swiss.ai.mit.edu/~bal/pks-toplev.html

RSA

For information on cryptography by the company responsible for one of the most widely used algorithms, go to http://www.rsa.com.

TIS

Firewall information, and even a copy of the TIS Toolkit - used for building firewalls - can be found at: http://www.tis.com. Other firewall information can be obtained from Greatcircle's ftp site at: ftp://ftp.greatcircle.com/pub

Utilities

There are a number of security related utilities available. The following list gives the name of the utility and the site from which it can be obtained:

Ckpasswd ftp://gatekeeper.dec.com/pub/
COPS ftp://ftp.cert.org/pub/tools/cops
Courtney ftp://ciac.llnl.gov/pub/ciac
Crack ftp://ftp.cert.org/pub/tools/crack
Gabriel http://www.lat.com/gabe.htm
Opie ftp://ftp.nrl.navy.mil/pub/security/nrl-opie
Secure Telnet ftp://ftp.adfa.oz.au/pub/security/adfa-telnet
sendmail ftp://ftp.cs.berkeley.edu
S/Key ftp://thumper.bellcore.com/pub/nmh/skey/
socks ftp://ftp.nec.com/pub/security/socks.cstc
http://www.socks.nec.com
ftp://ftp.cup.hp.com/dist/socks ssh
(Secure Shell) ftp://ftp.cs.hut.fi:/pub/ssh/
http://www.cs.hut.fi/ssh
tcpdump,
libpcap http://ciac.llnl.gov
tcp_wrappers ftp://ftp.win.tue.nl:/pub/security/tcp_wrappers_6.3.shar.Z
VeriSign http://www.verisign.com
ViaCrypt http://www.viacrypt.com
Wietse
Venema ftp Archive
ftp://ftp.win.tue.nl:/pub/security

RFC Index List

The remainder of this article contains selected citations for the past few years of RFCs containing information pertinent to security. RFCs are listed in reverse numeric order (as of 5/20/1996), and appear in the following format:

NUM STD Author 1, Author 5., "Title of RFC," Issue date. (Pages=##) (Format=.txt or .ps) (FYI ##) (STD ##) (RTR ##) (Obsoletes RFC####) (Updates RFC####)

Key to Citations

#### is the RFC number; ## p. is the total number of pages.

The format and byte information follows the page information in parenthesis. The format, either ASCII text (TXT) or PostScript (PS) or both, is noted, followed by an equals sign and the number of bytes for that version (PostScript is a registered trademark of Adobe Systems Incorporated). The example (Format: PS=xxx TXT=zzz bytes) shows that the PostScript version of the RFC is xxx bytes and the ASCII text version is zzz bytes.

The (Also FYI ##) phrase gives the equivalent FYI number if the RFC was also issued as an FYI document.

"Obsoletes xxx" refers to other RFCs that this one replaces; "Obsoleted by xxx" refers to RFCs that have replaced this one. "Updates xxx" refers to other RFCs that this one merely updates (but does not replace); "Updated by xxx" refers to RFCs that have updated this one (but not replaced). Only immediately succeeding and/or preceding RFCs are indicated, not the entire history of each related earlier or later RFC in a related series.

For example:

1129 D. Mills, "Internet time synchronization: The Network Time Protocol", 10/01/1989. (Pages=29) (Format=.ps)

Many RFCs are available online; if not, this is indicated by (Not online). Online copies are available via ftp from the InterNIC Directory and Database Services server, ds.internic.net, as rfc/rfc####.txt or rfc/rfc####.ps (#### is the RFC number without leading zeroes).

Paper copies of all RFCs are available from InterNIC Information Services. For more information, contact info@is.internic.net or call 1-800-444-4345 (choose prompt 3 from the InterNIC menu). RFCs can also be requested through email from the InterNIC Directory and Database Services automated mail server by sending a message to the following address: mailserv@ds.internic.net. In the body of the message, include the following command:

document-by-name rfcNNNN

in which NNNN is the number of the RFC. For PostScript RFCs, specify the extension (e.g., document-by-name rfcNNNN.ps). Multiple requests can be sent in a single message by specifying each document in a comma-separated list (e.g., document-by-name rfcNNNN, rfcYYYY), or by including multiple document-by-name commands on separate lines.

The RFC Index can be requested by typing document-by-name rfc-index.

Citations

1790 I V. Cerf, "An Agreement between the Internet Society and Sun

Microsystems, Inc. in the Matter of ONC RPC and XDR Protocols," 04/17/1995. (Pages=6) (Format=.txt)

1789 I C. Yang, "INETPhone: Telephone Services and Servers on Internet," 04/17/1995. (Pages=6) (Format=.txt)

1780 S J. Postel, "INTERNET OFFICIAL PROTOCOL STANDARDS," 03/28/1995. (Pages=39) (Format=.txt) (Obsoletes RFC 1720) (STD 1)

1761 I B. Callaghan, R. Gilligan, "Snoop Version 2 Packet Capture File Format," 02/09/1995. (Pages=6) (Format=.txt)

1760 I N. Haller, "The S/KEY One-Time Password System," 02/15/1995. (Pages=12) (Format=.txt)

1757 DS S. Waldbusser, "Remote Network Monitoring Management Information Base," 02/10/1995. (Pages=91) (Format=.txt) (Obsoletes RFC 1271)

1750 I D. Eastlake, S. Crocker, J. Schiller, "Randomness Recommendations for Security," 12/29/1994. (Pages=25) (Format=.txt)

1746 I B. Manning, D. Perkins, "Ways to Define User Expectations," 12/30/1994. (Pages=18) (Format=.txt)

1734 PS J. Myers, "POP3 AUTHentication command," 12/20/1994. (Pages=5)(Format=.txt)

1713 I A. Romao, "Tools for DNS debugging," 11/03/1994. (Pages=13)(Format=.txt) (FYI 27)

1712 E C. Farrell, M. Schulze, S. Pleitner, D. Baldoni, "DNS Encoding of Geographical Location," 11/01/1994. (Pages=7) (Format=.txt)

1704 I N. Haller, R. Atkinson, "On Internet Authentication," 10/26/1994. (Pages=17) (Format=.txt)

1675 I S. Bellovin, "Security Concerns for IPng," 08/08/1994. (Pages=4) (Format=.txt)

1663 PS D. Rand, "PPP Reliable Transmission," 07/21/1994. (Pages=7) (Format=.txt)

1644 E R. Braden, "T/TCP - TCP Extensions for Transactions Functional Specification," 07/13/1994. (Pages=38) (Format=.txt)

1642 E D. Goldsmith, M. Davis, "UTF-7 - A Mail-Safe Transformation Format of Unicode," 07/13/1994. (Pages=14) (Format=.txt)

1636 I I. Architecture Board, R. Braden, D. Clark, S. Crocker, C. Huitema, "Report of IAB Workshop on Security in the Internet Architecture -February 8-10, 1994," 06/09/1994. (Pages=52) (Format=.txt)

1635 I P. Deutsch, A. Emtage, A. Marine, "How to Use Anonymous FTP," 05/25/1994. (Pages=13) (Format=.txt) (FYI 24)

1627 I E. Lear, E. Fair, D. Crocker, T. Kessler, "Network 10 Considered Harmful (Some Practices Shouldn't be Codified)," 07/01/1994. (Pages=8) (Format=.txt)

1624 I A. Rijsinghani, "Computation of the Internet Checksum via Incremental Update," 05/20/1994. (Pages=6) (Format=.txt) (Updates RFC1141)

1579 I S. Bellovin, "Firewall-Friendly FTP," 02/18/1994. (Pages=4) (Format=.txt)

1545 E D. Piscitello, "FTP Operation Over Big Address Records (FOOBAR)," 11/16/1993. (Pages=5) (Format=.txt) (Obsoleted by RFC1639)

1541 PS R. Droms, "Dynamic Host Configuration Protocol," 10/27/1993. (Pages=39) (Format=.txt) (Obsoletes RFC1531)

1537 I P. Beertema, "Common DNS Data File Configuration Error," 10/06/1993. (Pages=9) (Format=.txt)

1536 I A. Kumar, J. Postel, C. Neuman, P. Danzig, S. Miller, "Common DNS Implementation Errors and Suggested Fixes," 10/06/1993. (Pages=12) (Format=.txt)

1535 I E. Gavron, "A Security Problem and Proposed Correction With Widely Deployed DNS Software," 10/06/1993. (Pages=5) (Format=.txt)

1534 PS R. Droms, "Interoperation Between DHCP and BOOTP," 10/08/1993. (Pages=4) (Format=.txt)

1533 PS S. Alexander, R. Droms, "DHCP Options and BOOTP Vendor Extensions," 10/08/1993. (Pages=30) (Format=.txt) (Obsoletes RFC1497)

1532 PS W. Wimer, "Clarifications and Extensions for the Bootstrap Protocol," 10/08/1993. (Pages=22) (Format=.txt) (Updates RFC0951) (Obsoleted by RFC1542)

1531 PS R. Droms, "Dynamic Host Configuration Protocol," 10/07/1993. (Pages=39) (Format=.txt) (Obsoleted by RFC1541)

1510 PS J. Kohl, B. Neuman, "The Kerberos Network Authentication Service (V5)," 09/10/1993. (Pages=112) (Format=.txt)

1509 PS J. Wray, "Generic Security Service API: C-bindings," 09/10/1993. (Pages=48) (Format=.txt)

1508 PS J. Linn, "Generic Security Service Application Program Interface," 09/10/1993. (Pages=49) (Format=.txt)

1507 E C. Kaufman, "DASS - Distributed Authentication Security Service," 09/10/1993. (Pages=119) (Format=.txt)

1498 I J. Saltzer, "On the Naming and Binding of Network Destinations," 08/04/1993. (Pages=10) (Format=.txt)

1496 PS H. Alvestrand, J. Romaguera, K. Jordan, "Rules for downgrading messages from X.400/88 to X.400/84 when MIME content-types are present in the messages," 08/26/1993. (Pages=7) (Format=.txt) (Updates RFC1328)

1472 PS F. Kastenholz, "The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol," 06/08/1993. (Pages=11) (Format=.txt)

1457 I R. Housley, "Security Label Framework for the Internet," 05/26/1993. (Pages=14) (Format=.txt)

1455 E D. Eastlake, III, "Physical Link Security Type of Service," 05/26/1993. (Pages=6) (Format=.txt)

1446 PS J. Galvin, K. McCloghrie, "Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)," 05/03/1993. (Pages=51) (Format=.txt)

1424 PS B. Kaliski, "Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services," 02/10/1993. (Pages=9) (Format=.txt)

1423 PS D. Balenson, "Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers," 02/10/1993. (Pages=14) (Format=.txt) (Obsoletes RFC1115)

1422 PS S. Kent, "Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management," 02/10/1993. (Pages=32) (Format=.txt) (Obsoletes RFC1114)

1421 PS J. Linn, "Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures," 02/10/1993. (Pages=42) (Format=.txt) (Obsoletes RFC1113)

1412 E K. Alagappan, "Telnet Authentication: SPX," 01/27/1993. (Pages=4) (Format=.txt)

1411 E D. Borman, "Telnet Authentication: Kerberos Version 4," 01/26/1993. (Pages=4) (Format=.txt)

1409 E D. Borman, "Telnet Authentication Option," 01/26/1993. (Pages=7) (Format=.txt) (Obsoleted by RFC1416)

1408 H D. Borman, "Telnet Environment Option," 01/26/1993. (Pages=7) (Format=.txt) (Updated by RFC1571)

1404 I B. Stockman, "A Model for Common Operational Statistics," 01/20/1993. (Pages=27) (Format=.txt)

1355 I J. Curran, A. Marine, "Privacy and Accuracy Issues in Network Information Center Databases," 08/04/1992. (Pages=4) (Format=.txt) (FYI 15)

1352 H J. Davin, J. Galvin, K. McCloghrie, "SNMP Security Protocols," 07/06/1992. (Pages=41) (Format=.txt)

1351 H J. Davin, J. Galvin, K. McCloghrie, "SNMP Administrative Model," 07/06/1992. (Pages=35) (Format=.txt)

1321 I R. Rivest, "The MD5 Message-Digest Algorithm," 04/16/1992. (Pages=21) (Format=.txt)

1320 I R. Rivest, "The MD4 Message-Digest Algorithm," 04/16/1992. (Pages=20) (Format=.txt) (Obsoletes RFC1186)

1319 I B. Kaliski, "The MD2 Message-Digest Algorithm," 04/16/1992. (Pages=17) (Format=.txt) (Updates RFC1115)

1288 DS D. Zimmerman, "The Finger User Information Protocol," 12/19/1991. (Pages=12) (Format=.txt) (Obsoletes RFC1196)

1282 I B. Kantor, "BSD Rlogin," 12/04/1991. (Pages=5) (Format=.txt) (Obsoletes RFC1258)

1281 I S. Crocker, B. Fraser, R. Pethia, "Guidelines for the Secure Operation of the Internet," 11/27/1991. (Pages=10) (Format=.txt)

1244 I P. Holbrook, J. Reynolds, "Site Security Handbook," 07/23/1991. (Pages=101) (Format=.txt) (FYI 8)

About the authors

William Steen owns and operates a consulting firm specializing in networking small businesses and local governmental agencies.

Emmett Dulaney is a publishing manager for New Riders Publishing and can be reached on Compuserve at 74507.3713.