956 lines
40 KiB
Plaintext
956 lines
40 KiB
Plaintext
|
|
||
|
Computer underground Digest Sun Aug 27, 1995 Volume 7 : Issue 70
|
||
|
ISSN 1004-042X
|
||
|
|
||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@MVS.CSO.NIU.EDU
|
||
|
Archivist: Brendan Kehoe
|
||
|
Shadow Master: Stanton McCandlish
|
||
|
Field Agent Extraordinaire: David Smith
|
||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
||
|
Ralph Sims / Jyrki Kuoppala
|
||
|
Ian Dickinson
|
||
|
|
||
|
CONTENTS, #7.70 (Sun, Aug 27, 1995)
|
||
|
|
||
|
File 1--Church of Scientology Sues Washington Post
|
||
|
File 2--Comments on Beverly LaHaye Live
|
||
|
File 3--Security Mailing Lists
|
||
|
File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
||
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
||
|
|
||
|
---------------------------------------------------------------------
|
||
|
|
||
|
Date: Sun, 28 Aug 1995 11:13:43 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 1--Church of Scientology Sues Washington Post
|
||
|
|
||
|
((MODERATORS' NOTE: The Church of Scientology has recently been
|
||
|
accused of intimidating critics, cancelling posts, engaging in
|
||
|
"litigation terrorism," and other alleged actions designed to silence
|
||
|
critics. Discussion of these issues proliferates on Usenet's
|
||
|
alt.religion.scientology. Links to homepages providing additional
|
||
|
details of allegations against CoS can be found on CuD's homepage
|
||
|
(http://www.soci.niu.edu/~cudigest
|
||
|
|
||
|
Careful readers will note that the wording of the following release is
|
||
|
less objective than the style makes it seem))
|
||
|
|
||
|
Date--22 Aug 1995 14:26:09 -0700
|
||
|
From--milne@crl.com (Andrew Milne)
|
||
|
Subject--WASHINGTON POST SUED FOR VIOLATING SCIENTOLOGY COPYRIGHTS
|
||
|
|
||
|
=============================================================
|
||
|
|
||
|
August 22, 1995
|
||
|
NEWS RELEASE
|
||
|
|
||
|
CONTACT: LEISA GOODMAN OR
|
||
|
EARLE COOLEY
|
||
|
(202) 667-6404
|
||
|
|
||
|
|
||
|
WASHINGTON POST SUED FOR VIOLATING SCIENTOLOGY COPYRIGHTS
|
||
|
|
||
|
Subject--WASHINGTON POST SUED FOR VIOLATING SCIENTOLOGY COPYRIGHTS
|
||
|
Date: 22 Aug 1995 14:26:09 -0700
|
||
|
|
||
|
August 22, 1995
|
||
|
NEWS RELEASE
|
||
|
|
||
|
CONTACT: LEISA GOODMAN OR
|
||
|
EARLE COOLEY
|
||
|
(202) 667-6404
|
||
|
|
||
|
|
||
|
WASHINGTON POST SUED FOR VIOLATING SCIENTOLOGY COPYRIGHTS
|
||
|
|
||
|
The Washington Post and two of its reporters were sued today in
|
||
|
the U.S. District Court for the Eastern District of Virginia by the
|
||
|
Religious Technology Center (RTC), holders of the intellectual
|
||
|
property rights of the Scientology religion. According to the
|
||
|
lawsuit, the Washington Post and its writers have engaged in
|
||
|
"extensive, intentional copyright infringement and trade secrets
|
||
|
misappropriattion, targeting confidential Scientology scriptures
|
||
|
belonging to RTC." Judge Leonie Brinkema of the U.S. District Court
|
||
|
in Alexandria, due to the urgent nature of the matter, scheduled an
|
||
|
August 25 hearing on the temporary restraining order and impoundment
|
||
|
application to get the Washington Post to turn over the
|
||
|
misappropriated documents.
|
||
|
|
||
|
The lawsuit is an amendment of a complaint that was filed on
|
||
|
August 11 against an Arlington man, Arnaldo Lerma, and his Internet
|
||
|
access provider Digital Gateway Systems, for copyright and trade
|
||
|
secrets infringement. According to Boston lawyer Earle C. Cooley,
|
||
|
who represents Religious Technology Center, the newspaper and their
|
||
|
two reporters, Richard Leiby and Marc Fisher, were added to the
|
||
|
lawsuit because they engaged in their own direct infringements of
|
||
|
plaintiff's copyright interests and misappropriation of plaintiff's
|
||
|
trade secrets, while at the same time aiding, supporting,
|
||
|
encouraging, and facilitating blatant acts of infringement and
|
||
|
misappropriation by Lerma.
|
||
|
|
||
|
The day after the lawsuit was filed, on August 12, a search and
|
||
|
seizure order by Judge Brinkema was carried out at Lerma's home by
|
||
|
Federal Marshals and computer software, hardware and documents were
|
||
|
confiscated. Church lawyers report that they were able to establish
|
||
|
that Lerma lied because, contrary to his assertions that computer
|
||
|
discs had been purged of any stolen materials, their electronic
|
||
|
experts have already found 63 copyright items among the seized
|
||
|
material.
|
||
|
|
||
|
The new lawsuit reveals that Lerma sent the protected materials
|
||
|
to Leiby when he was put on notice by the Church to stop violating
|
||
|
its copyright and trade secret rights. The Church now charges that
|
||
|
this was done in an attempt to obstruct justice by concealing the
|
||
|
stolen copies from lawful seizure. The suit claims the existence of
|
||
|
evidence which shows that Richard Leiby choreographed and instigated
|
||
|
Lerma's illegal conduct for his own campaign of harassment against
|
||
|
the Scientology religion. According to the lawsuit, Leiby's
|
||
|
campaign dates back more than 15 years.
|
||
|
|
||
|
Church spokeswoman Leisa Goodman said "The Washington Post and
|
||
|
Mr. Leiby violated fundamental journalistic integrity by conspiring
|
||
|
with lawless elements on the Internet to harm the religion of
|
||
|
Scientology."
|
||
|
|
||
|
Once the Church became aware that its materials were in the
|
||
|
possession of Richard Leiby, it demanded their immediate return.
|
||
|
Leiby and the Washington Post handed the stolen copies over to RTC's
|
||
|
lawyers last week on August 15. However, "the return of the
|
||
|
materials, a seeming display of good faith, was an utter ruse", the
|
||
|
complaint states. "At the same time that the materials were being
|
||
|
returned to the Church in Washington, Leiby, Fisher and the Post
|
||
|
were getting copies of the same stolen records from the clerk's file
|
||
|
in LA where litigation was pending regarding the sealing of such
|
||
|
materials. A Post reporter persuaded the clerk's office to take the
|
||
|
documents away from a Church employee who had checked out the file,
|
||
|
to make copies for the Post," the complaint continues.
|
||
|
|
||
|
The Church reacted with an emergency motion to the judge on the
|
||
|
case in Los Angeles, who immediately ordered the entire case file
|
||
|
sealed on August 15, when he was told that the Washington Post had
|
||
|
obtained a copy of the copyrighted and trade secret materials.
|
||
|
|
||
|
According to the lawsuit, the Church immediately demanded the
|
||
|
materials back and also put the post on notice "that its actions
|
||
|
could not remotely be deemed news gathering, but rather constituted
|
||
|
wholesale copying of a large amount of copyrighted trade secret
|
||
|
information in an attempt to sanitize the illicit acquisition of
|
||
|
infringing documents which Leiby and the Post concealed on Lerma's
|
||
|
behalf."
|
||
|
|
||
|
Church spokeswoman Goodman discounted the notion that any free
|
||
|
speech or fair-use issues were involved. "Violators of copyright
|
||
|
and trade secret laws traditionally try to hide behind free speech
|
||
|
or fair-use claims. The Church is a strong proponent of free speech
|
||
|
and fair-use. It publishes its own investigative magazine and
|
||
|
cherishes the First Amendment. However, free speech or fair-use
|
||
|
does not mean free theft and no one, the Washington Post included,
|
||
|
has the right to cloak themselves in the First Amendment to break
|
||
|
the law."
|
||
|
|
||
|
Despite repeated warnings from Church lawyers, last Saturday
|
||
|
the Washington Post published a lengthy article by Marc Fisher,
|
||
|
which included quotes from the copyrighted, trade secret materials.
|
||
|
"Prior to publication of the article, the defendants were placed on
|
||
|
notice that their actions would constitute a violation of
|
||
|
plaintiff's rights," said Goodman.
|
||
|
|
||
|
"The Post made a serious mistake," RTC's lawyer Earle C.
|
||
|
Cooley contends, "in allowing themselves to be manipulated by a few
|
||
|
maliciously motivated dissidents who want to use the Post to forward
|
||
|
their religious hate campaign. The courts take these matters very
|
||
|
seriously. The law is clear: If you are going to violate
|
||
|
copyrights, you will have to answer for it in court. This applies
|
||
|
to the Washington Post just as much as to anyone else."
|
||
|
|
||
|
With this lawsuit, Religious Technology Center is asking the
|
||
|
court to order the return of its documents by the Washington Post
|
||
|
and grant a permanent injunction against the Post and the individual
|
||
|
violators of its rights. It also seeks statutory damages and
|
||
|
punitive damages.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Fri, 25 Aug 1995 18:48:49 -0400
|
||
|
From: timk@CYBERCOM.NET(Tim King)
|
||
|
Subject: File 2--Comments on Beverly LaHaye Live
|
||
|
|
||
|
Not too long ago, there was posted a transcript of a particular Beverly
|
||
|
LaHaye Live, a syndicated christian radio program. And as a conservative
|
||
|
christian, I'd like to say, for the record, that the episode can be summed
|
||
|
up in one word: "sensationalism." This sensationalism manifests itself
|
||
|
thoughout in factual innaccuracies and ommissions, in misused
|
||
|
emotionally-loaded language, and in a decidely lopsided approach.
|
||
|
|
||
|
In the way of inaccuracies, Pat Truman, several times, fails to stress the
|
||
|
legal difference between indecency and obscenity. He says that the Internet
|
||
|
is "a highway, literally, from your computer to _every other computer in the
|
||
|
world_." He says that if your computer isn't connected to the Internet,
|
||
|
"your neighbor's computer probably is, your school computer is," making Net
|
||
|
connections appear almost as common as telephones. He says that the
|
||
|
Thomases of Amateur Action BBS were convicted of "putting pornography on the
|
||
|
Internet," even though the Internet never came into their case.
|
||
|
|
||
|
But the single pervasive element throughout was alarmism. The gist of the
|
||
|
entire show can be interpreted: "The porn-meisters are coming. Everybody
|
||
|
panic and lock your young ones in a closet." This, in my opinion, is simply
|
||
|
not true.
|
||
|
|
||
|
|
||
|
Beverly LaHaye opens by saying, "And thanks to the Information Superhighway,
|
||
|
pornography could be invading your home without you even knowing it. The
|
||
|
challenge for parents today is finding ways to keep their children from
|
||
|
being exposed to these vulgar influences." I would re-word this: "The open
|
||
|
environment of the Internet allows adult material, as well as non-adult
|
||
|
material, to be freely circulated. Parents who want to place limits on what
|
||
|
their children can access may find it a challenge." Phrased thusly, I would
|
||
|
agree with the sentiment.
|
||
|
|
||
|
It may be factually true that "pornography could be invading your home
|
||
|
without you even knowing it." But the path of least resistence is still
|
||
|
education rather than legislation. I must further disagree with the
|
||
|
implication that the ignorance of parents is the fault of "the Information
|
||
|
Superhighway." Is it not true that, no matter what controls are in place,
|
||
|
it is the responsibility of parents to monitor their childrens' development?
|
||
|
|
||
|
Moreover, I don't think that pornography is the only issue. The concern,
|
||
|
broadly speaking, is that children will get ahold of adult material. But is
|
||
|
it not the responsibility -- and the right -- of each child's parents to
|
||
|
judge, as they see fit, what is or is not suitable for their kids?
|
||
|
|
||
|
I would recommend consideration of some simple, common-sense steps. Take an
|
||
|
interest in the email conversations your child has with others. Do you take
|
||
|
an interest in your child's friends? Take an interest in his Internet
|
||
|
aquaintances, too. Make sure your child understands a few rules: Don't
|
||
|
tell anyone on the Internet your address, telephone number, or age. Don't
|
||
|
agree to meet, in person, anyone you meet, electronically, on the Internet.
|
||
|
And make sure to tell Mom or Dad if anyone says anything you're not
|
||
|
comfortable with via email. And don't talk to, take candy from, or get into
|
||
|
a car with a stranger. I would also suggest parents take a look at
|
||
|
<http://www.crc.ricoh.com/people/steve/warn-kids.html> and
|
||
|
<http://silver.ucs.indiana.edu/~lchampel/netadv.htm>.
|
||
|
|
||
|
One suggestion Mr. Truman presents, which sounds like a good one to me, is
|
||
|
to put the computer in the kitchen, in the den, or in the living room, where
|
||
|
everybody can see it. Surely this will make a child think twice about
|
||
|
actively seeking off-limits materials, and it will provide a way for the
|
||
|
child's parents to keep an eye on him.
|
||
|
|
||
|
Of course, Mr. Truman, true to form, can't leave well enough alone. He also
|
||
|
suggests keeping the computer away from phone lines, "because this is all
|
||
|
transacted by plugging your computer into a phone line. And every computer
|
||
|
is equipped with that..." Even if the computer has a modem and it is
|
||
|
plugged into the phone line, the child would have to (1) obtain and (2)
|
||
|
install appropriate software and (3) learn how to use it. Additionally, he
|
||
|
must (4) obtain an Internet account. It is unfathomable that a child could
|
||
|
covertly connect to the Internet, not having previously been given all of
|
||
|
what is needed to accomplish the task. I'm not trying to underestimate the
|
||
|
concern this may still be for some parents, but these facts would probably
|
||
|
have put some parents' minds at ease, had Mr. Truman cared to point them out.
|
||
|
|
||
|
|
||
|
Pat Truman correctly points out the future for pornography is over the
|
||
|
Internet. The future for civilization in general is over the Internet.
|
||
|
Although I share his conviction concerning technology, however, I don't
|
||
|
share his alarm. It is not surprising to me that extant materials and
|
||
|
practices are being adapted to the Internet. The presence of pornography on
|
||
|
the Internet is no more surpising than that of library card catalogs, gift
|
||
|
baskets, and record shops.
|
||
|
|
||
|
But Mr. Truman says, "I was shocked. I've been in the worst pornography
|
||
|
shops in Manhattan, downtown New York, on investigations, and anything I saw
|
||
|
there was available on the Internet... It's hard to believe that people
|
||
|
would record sexual acts and put them on the Internet..." I don't know why
|
||
|
he was shocked. Did he actually think that the Internet was a moral
|
||
|
safe-haven, sheltered from humanity? Is he really _that_ naive? Is it
|
||
|
really that hard to believe, knowing that people record sexual acts and put
|
||
|
them on paper and video, that they would do the same over the Internet? I
|
||
|
find Mr. Truman's reaction difficult to accept. Maybe he was disgusted, but
|
||
|
not shocked. Nevertheless, far be it from me to try to second-guess his
|
||
|
thoughts. If he says he was shocked... Well...
|
||
|
|
||
|
|
||
|
He points to "a problem that is very much related to pornography, it's these
|
||
|
obscene conversations that you can have - worldwide conversations, you can
|
||
|
talk to someone... and have a _terrible_ conversation. There are no age
|
||
|
limits. And, uh, it's all..."
|
||
|
|
||
|
Uh, yeah. Uh... He never specifies to which "obscene conversations" he's
|
||
|
referring. Nonetheless, how do "_terrible_" -- ~shiver~ -- "worldwide
|
||
|
conversations" differentiate the Internet from the telephone? And if I want
|
||
|
to talk dirty with my wife -- or with anyone else -- what does that have to
|
||
|
do with pornography? For the concerns about children, see my comments above.
|
||
|
|
||
|
|
||
|
Ms. LaHaye is concerned that the kids will "go over to Johnny's house to
|
||
|
spend the afternoon, and Johnny's got a computer and knows how to enter all
|
||
|
this, and here these two boys _play_ with this kind of _porn_!" And the
|
||
|
same hypothetical Johnny probably has a Hustler magazine under his mattress.
|
||
|
Now, my parents took care to be informed concerning my friends. They wanted
|
||
|
to know where I was, what I was doing, and with whom I was doing it. Any
|
||
|
parent who doesn't take the same care in raising their children has, at
|
||
|
least partially, himself to blame for their friends' influence.
|
||
|
|
||
|
Mr. Truman says, "You can buy software as a parent that will block this
|
||
|
material... So these access providers now say, ... go buy something for 50
|
||
|
bucks... And my position is, ... _you_ provide the software..." This is a
|
||
|
most naive view. Does Mr. Truman honestly think that, even if service
|
||
|
providers were forced to provide blocking software, users would not be
|
||
|
charged? I can just see the $50 installation fees, even for those user's
|
||
|
that could rather go without.
|
||
|
|
||
|
He says, "I had a high school librarian in Seattle, Washington call me the
|
||
|
other day because she [used] the Internet Yellow Pages [to find the] US
|
||
|
Government, Executive Branch, Clinton Cabinet. You dial that in, you get
|
||
|
obscene work, after obscene work, after obscene work." Huh? Is this
|
||
|
supposed to be some sort of a dumb political joke?
|
||
|
|
||
|
|
||
|
But the one that took the cake, the most moving of all -- so moving, in
|
||
|
fact, that I thought I would heave -- is the following sequence:
|
||
|
|
||
|
"But the reason I criticized the Exon bill... is that he would give immunity
|
||
|
from prosecution from the major pornography _profiteers_... The person who
|
||
|
put [the porn] on the Internet didn't charge for it. But _Netcom_, or
|
||
|
America OnLine, or these others, _will_ charge you... Some people spend
|
||
|
hundreds and hundreds of dollars viewing it, and some of those people are
|
||
|
children... the pornographer profiteers today are the people who give you
|
||
|
access to the Internet... And they know that material's there, they know
|
||
|
that's why thousands and thousands of people subscribe every month to their
|
||
|
services, that is in order to get pornography. So the pornography
|
||
|
profiteers today are the access providers, like Netcom, CompuServe, etc."
|
||
|
|
||
|
Hundreds and hundreds of dollars? I think you need a new ISP. And some
|
||
|
children spend this much? Don't their parents wonder about the bill?
|
||
|
Thousands and thousands of people? Name six. And, by the way, since you
|
||
|
have all of these nifty statistics at your fingertips, what percentage of
|
||
|
all Internet users does that "thousands and thousands" represent?
|
||
|
|
||
|
I most strongly contest the labelling of Internet service providers as
|
||
|
"pornography profiteers." This is a most inaccurate description when
|
||
|
applied to practially all, if not all, ISPs. There can be no excuse for the
|
||
|
utterance of such ignorant and careless hogwash. ISPs charge for Internet
|
||
|
access, not for pornography. From their perspective, if you choose to
|
||
|
access pornography, that's your business. I don't know of any ISPs that
|
||
|
don't charge the same rate regardless of whether one accesses Penthouse
|
||
|
magazine or The Christian Coalition's Home Page.
|
||
|
|
||
|
|
||
|
You guys, take a step back and stop making a mockery out of issues we --
|
||
|
christians, U.S. citizens, and conservatives -- hold dear.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Thu, 24 Aug 1995 18:36:51 +1494730 (PDT)
|
||
|
From: Christopher Klaus <cklaus@ISS.NET>
|
||
|
Subject: File 3--Security Mailing Lists
|
||
|
|
||
|
This was put together to hopefully promote greater awareness of the security
|
||
|
lists that already exist. Most security mailing lists have been only
|
||
|
announced once and it was only word of mouth that it would acquire new
|
||
|
members. This list should hopefully make the membership grow for each
|
||
|
mailing list.
|
||
|
|
||
|
If you know of any mailing lists that have been skipped, please e-mail
|
||
|
cklaus@iss.net with the info.
|
||
|
|
||
|
The newest updates for this will be on http://iss.net/. This web site
|
||
|
also contains info for the following security issues:
|
||
|
|
||
|
Vendor security contacts
|
||
|
Security Patches
|
||
|
What to do if you are compromised
|
||
|
Set up Anon ftp securely
|
||
|
Sniffers attacks and solutions
|
||
|
|
||
|
|
||
|
|
||
|
Security Mailing Lists
|
||
|
|
||
|
The following FAQ is a comprehensive list of security mailing lists. These
|
||
|
security mailing lists are important tools to network administrators, network
|
||
|
security officers, security consultants, and anyone who needs to keep abreast
|
||
|
of the most current security information available.
|
||
|
|
||
|
General Security Lists
|
||
|
|
||
|
* 8lgm (Eight Little Green Men)
|
||
|
* Academic-Firewalls
|
||
|
* Best of Security
|
||
|
* Bugtraq
|
||
|
* Computer Privacy Digest (CPD)
|
||
|
* Computer Underground Digest (CuD)
|
||
|
* Cypherpunks
|
||
|
* Cypherpunks-Announce
|
||
|
* Firewalls
|
||
|
* Intruder Detection Systems
|
||
|
* Phrack
|
||
|
* PRIVACY Forum
|
||
|
* Risks
|
||
|
* Sneakers
|
||
|
* Virus
|
||
|
* Virus Alert
|
||
|
|
||
|
Security Products
|
||
|
|
||
|
* Tiger
|
||
|
* TIS Firewallk Toolkit
|
||
|
|
||
|
Vendors and Organizations
|
||
|
|
||
|
* CERT
|
||
|
* CIAC
|
||
|
* HP
|
||
|
* Sun
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
8lgm (Eight Little Green Men)
|
||
|
|
||
|
To join, send e-mail to majordomo@8lgm.org and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
subscribe 8lgm-list
|
||
|
|
||
|
Group of hackers that periodically post exploit scripts for various Unix bugs.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Academic Firewalls
|
||
|
|
||
|
To join, send e-mail to majordomo@net.tamu.edu and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE Academic-Firewalls
|
||
|
|
||
|
This is an unmoderated list maintained by Texas A&M University. Its purpose is
|
||
|
to promote the discussion and use of firewalls and other security tools in an
|
||
|
academic environment. It is complementary to the Firewalls list maintained by
|
||
|
Brent Chapman (send subscription requests to Majordomo@GreatCircle.COM) which
|
||
|
deals primarily with firewall issues in a commercial environment. Academic
|
||
|
environments have different political structures, ethical issues, expectations
|
||
|
of privacy and expectations of access.
|
||
|
|
||
|
Many documented incidents of cracker intrusions have either originated at or
|
||
|
passed through academic institutions. The security at most universities is
|
||
|
notoriously lax or even in some cases completely absent. Most institutions
|
||
|
don't use firewalls because they either don't care about their institution's
|
||
|
security, they feel firewalls are not appropriate or practical, or they don't
|
||
|
know the extent to which they are under attack from the Internet.
|
||
|
|
||
|
At Texas A&M University we have been using a combination of a flexible packet
|
||
|
filter, intrusion detection tools, and Unix security audit utilities for almost
|
||
|
two years. We have found that simple firewalls combined with other tools are
|
||
|
feasible in an academic environment. Hopefully the discussion on this list will
|
||
|
begin to raise the awareness of other institutions also.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Best of Security
|
||
|
|
||
|
To join, send e-mail to best-of-security-request@suburbia.net with the
|
||
|
following in the body of the message:
|
||
|
|
||
|
subscribe best-of-security
|
||
|
|
||
|
REASONS FOR INCEPTION
|
||
|
|
||
|
In order to compile the average security administrator it was found that the
|
||
|
compiler had to parse a foreboding number of exceptionally noisy and
|
||
|
semantically-content-free data sets. This led to exceptionally high load
|
||
|
averages and a dramatic increase in core entropy.
|
||
|
|
||
|
Further, the number, names and locations of this data appears to change on an
|
||
|
almost daily basis; requiring tedious version control on the part of the mental
|
||
|
maintainer. Best-of-Security is at present an un-moderated list. That may sound
|
||
|
strange given our stated purpose of massive entropy reduction; but because best
|
||
|
often equates with "vital" and the moderator doesn't have an MDA habit it is
|
||
|
important that material sent to this list be delivered to its subscribers' in
|
||
|
as minimal period of time as is (in)humanly possible.
|
||
|
|
||
|
If you find *any* information from *any* source (including other mailinglists,
|
||
|
newsgroups, conference notes, papers, etc) that fits into one of the acceptable
|
||
|
categories described at the end of this document then you should *immediately*
|
||
|
send it to "best-of-security@suburbia.net". Do not try and predict whether or
|
||
|
not someone else will send the item in question to the list in the immediate
|
||
|
future. Unless your on a time-delayed mail vector such as polled uucp or the
|
||
|
item has already appeared on best-of-security, mail the info to the list! Even
|
||
|
if it is a widely deployed peice of information such as a CERT advisory the
|
||
|
proceeding argument still applies. If the information hasn't appeared on this
|
||
|
list yet, then SEND IT. It is far better to run the risk of minor duplication
|
||
|
in exchange for having the information out where it is needed than act
|
||
|
conservatively about occasional doubling up on content.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Bugtraq
|
||
|
|
||
|
To join, send e-mail to LISTSERV@NETSPACE.ORG and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE BUGTRAQ
|
||
|
|
||
|
This list is for *detailed* discussion of UNIX security holes: what they are,
|
||
|
how to exploit, and what to do to fix them.
|
||
|
|
||
|
This list is not intended to be about cracking systems or exploiting their
|
||
|
vunerabilities. It is about defining, recognizing, and preventing use of
|
||
|
security holes and risks.
|
||
|
|
||
|
Please refrain from posting one-line messages or messages that do not contain
|
||
|
any substance that can relate to this list`s charter.
|
||
|
|
||
|
Please follow the below guidelines on what kind of information should be posted
|
||
|
to the Bugtraq list:
|
||
|
|
||
|
* Information on Unix related security holes/backdoors (past and present)
|
||
|
* Exploit programs, scripts or detailed processes about the above
|
||
|
* Patches, workarounds, fixes
|
||
|
* Announcements, advisories or warnings
|
||
|
* Ideas, future plans or current works dealing with Unix security
|
||
|
* Information material regarding vendor contacts and procedures
|
||
|
* Individual experiences in dealing with above vendors or security
|
||
|
organizations
|
||
|
* Incident advisories or informational reporting
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Computer Privacy Digest
|
||
|
|
||
|
To join, send e-mail to comp-privacy-request@uwm.edu and, in the text of your
|
||
|
message (not the subject line), write:
|
||
|
|
||
|
subscribe cpd
|
||
|
|
||
|
The Computer PRIVACY Digest (CPD) (formerly the Telecom Privacy digest) is run
|
||
|
by Leonard P. Levine. It is gatewayed to the USENET newsgroup
|
||
|
comp.society.privacy. It is a relatively open (i.e., less tightly moderated)
|
||
|
forum, and was established to provide a forum for discussion on the effect of
|
||
|
technology on privacy. All too often technology is way ahead of the law and
|
||
|
society as it presents us with new devices and applications. Technology can
|
||
|
enhance and detract from privacy.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Computer Underground Digest
|
||
|
|
||
|
To join, send e-mail to LISTSERV@VMD.CSO.UIUC.EDU and, in the text of your
|
||
|
message (not the subject line), write:
|
||
|
|
||
|
SUB CUDIGEST
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Covers many issues of the computer underground.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Cypherpunks
|
||
|
|
||
|
To join, send e-mail to majordomo@toad.com and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE cypherpunks
|
||
|
|
||
|
The cypherpunks list is a forum for discussing personal defenses for privacy in
|
||
|
the digital domain. It is a high volume mailing list.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Cypherpunks Announce
|
||
|
|
||
|
To join, send e-mail to majordomo@toad.com and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE cypherpunks-announce
|
||
|
|
||
|
There is an announcements list which is moderated and has low volume.
|
||
|
Announcements for physical cypherpunks meetings, new software and important
|
||
|
developments will be posted there.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Firewalls
|
||
|
|
||
|
To join, send e-mail to majordomo@greatcircle.com and, in the text of your
|
||
|
message (not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE firewalls
|
||
|
|
||
|
Useful information regarding firewalls and how to implement them for security.
|
||
|
|
||
|
This list is for discussions of Internet "firewall" security systems and
|
||
|
related issues. It is an outgrowth of the Firewalls BOF session at the Third
|
||
|
UNIX Security Symposium in Baltimore on September 15, 1992.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Intrusion Detection Systems
|
||
|
|
||
|
To join, send e-mail to majordomo@uow.edu.au with the following in the body of
|
||
|
the message:
|
||
|
|
||
|
subscribe ids
|
||
|
|
||
|
The list is a forum for discussions on topics related to development of
|
||
|
intrusion detection systems.
|
||
|
|
||
|
Possible topics include:
|
||
|
|
||
|
* techniques used to detect intruders in computer systems and computer
|
||
|
networks
|
||
|
* audit collection/filtering
|
||
|
* subject profiling
|
||
|
* knowledge based expert systems
|
||
|
* fuzzy logic systems
|
||
|
* neural networks
|
||
|
* methods used by intruders (known intrusion scenarios)
|
||
|
* cert advisories
|
||
|
* scripts and tools used by hackers
|
||
|
* computer system policies
|
||
|
* universal intrusion detection system
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Phrack
|
||
|
|
||
|
To join, send e-mail to phrack@well.com and, in the text of your message (not
|
||
|
the subject line), write:
|
||
|
|
||
|
SUBSCRIBE Phrack
|
||
|
|
||
|
Phrack is a Hacker Magazine which deals with phreaking and hacking.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
PRIVACY Forum
|
||
|
|
||
|
To join, send e-mail to privacy-request@vortex.com and, in the text of your
|
||
|
message (not the subject line), write:
|
||
|
|
||
|
information privacy
|
||
|
|
||
|
The PRIVACY Forum is run by Lauren Weinstein. He manages it as a rather
|
||
|
selectively moderated digest, somewhat akin to RISKS; it spans the full range
|
||
|
of both technological and non-technological privacy-related issues (with an
|
||
|
emphasis on the former).
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Risks
|
||
|
|
||
|
To join, send e-mail to risks-request@csl.sri.com and, in the text of your
|
||
|
message (not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE
|
||
|
|
||
|
Risks is a digest that describes many of the technological risks that happen in
|
||
|
today's environment.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Sneakers
|
||
|
|
||
|
To join, send e-mail to majordomo@CS.YALE.EDU and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE Sneakers
|
||
|
|
||
|
The Sneakers mailing list is for discussion of LEGAL evaluations and
|
||
|
experiments in testing various Internet "firewalls" and other TCP/IP network
|
||
|
security products.
|
||
|
|
||
|
* Vendors are welcome to post challenges to the Internet network security
|
||
|
community
|
||
|
* Internet users are welcome to post anecdotal experiences regarding
|
||
|
(legally) testing the defenses of firewall and security products.
|
||
|
* "Above board" organized and/or loosely organized wide area tiger teams
|
||
|
(WATTs) can share information, report on their progress or eventual
|
||
|
success here.
|
||
|
|
||
|
There is a WWW page with instructions on un/subscribing as well as posting, and
|
||
|
where notices and pointers to resources (especially if I set up an archive of
|
||
|
this list) may be put up from time to time:
|
||
|
|
||
|
http://www.cs.yale.edu/HTML/YALE/CS/HyPlans/long-morrow/sneakers.html
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Virus
|
||
|
|
||
|
To join, send e-mail to LISTSERV@lehigh.edu and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE virus-l your-name
|
||
|
|
||
|
It is an electronic mail discussion forum for sharing information and ideas
|
||
|
about computer viruses, which is also distributed via the Usenet Netnews as
|
||
|
comp.virus. Discussions should include (but not necessarily be limited to):
|
||
|
current events (virus sightings), virus prevention (practical and theoretical),
|
||
|
and virus related questions/answers. The list is moderated and digested. That
|
||
|
means that any message coming in gets sent to me, the editor. I read through
|
||
|
the messages and make sure that they adhere to the guidelines of the list (see
|
||
|
below) and add them to the next digest. Weekly logs of digests are kept by the
|
||
|
LISTSERV (see below for details on how to get them). For those interested in
|
||
|
statistics, VIRUS-L is now up to about 2400 direct subscribers. Of those,
|
||
|
approximately 10% are local redistribution accounts with an unknown number of
|
||
|
readers. In addition, approximately 30,000-40,000 readers read comp.virus on
|
||
|
the USENET.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Virus Alert
|
||
|
|
||
|
To join, send e-mail to LISTSERV@lehigh.edu and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE valert-l your-name
|
||
|
|
||
|
What is VALERT-L?
|
||
|
|
||
|
It is an electronic mail discussion forum for sharing urgent virus warnings
|
||
|
among other computer users. Postings to VALERT-L are strictly limited to
|
||
|
warnings about viruses (e.g., "We here at University/Company X just got hit by
|
||
|
virus Y - what should we do?"). Followups to messages on VALERT-L should be
|
||
|
done either by private e-mail or to VIRUS-L, a moderated, digested, virus
|
||
|
discussion forum also available on this LISTSERV, LISTSERV@LEHIGH.EDU. Note
|
||
|
that any message sent to VALERT-L will be cross-posted in the next VIRUS-L
|
||
|
digest. To preserve the timely nature of such warnings and announcements, the
|
||
|
list is moderated on demand (see posting instructions below for more
|
||
|
information).
|
||
|
|
||
|
What VALERT-L is *not*?
|
||
|
|
||
|
A place to to anything other than announce virus infections or warn people
|
||
|
about particular computer viruses (symptoms, type of machine which is
|
||
|
vulnerable, etc.).
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Security Products
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Tiger
|
||
|
|
||
|
To join, send e-mail to majordomo@net.tamu.edu and, in the text of your message
|
||
|
(not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE tiger
|
||
|
|
||
|
Discussion list for the UNIX security audit tool TIGER
|
||
|
|
||
|
This is the TIGER users mailling list. It is for:
|
||
|
|
||
|
1. Update announcements
|
||
|
2. Reporting bugs in TIGER.
|
||
|
3. Discussing new features for TIGER.
|
||
|
4. Discussing use of TIGER.
|
||
|
5. Discussing anything else about TIGER.
|
||
|
|
||
|
What is TIGER?
|
||
|
|
||
|
TIGER is a set of shell scripts, C code and configuration files which are used
|
||
|
to perform a security audit on UNIX systems. The goals for TIGER are to make it
|
||
|
very robust and easy to use. TIGER was originally developed for checking hosts
|
||
|
at Texas A&M University following a break in in the Fall of 1992.
|
||
|
|
||
|
The latest version of TIGER is always available from the directory
|
||
|
net.tamu.edu:/pub/security/TAMU. In addition, updated digital signature files
|
||
|
for new platforms and new security patches will be maintained in the directory:
|
||
|
|
||
|
net.tamu.edu:/pub/security/TAMU/tiger-sigs.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
TIS Firewall Toolkit
|
||
|
|
||
|
To join, send e-mail to fwall-users-request@tis.com and, in the text of your
|
||
|
message (not the subject line), write:
|
||
|
|
||
|
SUBSCRIBE
|
||
|
|
||
|
Discussion list for the TIS firewall toolkit
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Vendors and Organizations
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
CERT (Computer Emergency Response Team) Advisory mailing list.
|
||
|
|
||
|
To join, send e-mail to cert@cert.org and, in the text of your message (not the
|
||
|
subject line), write:
|
||
|
|
||
|
I want to be on your mailing list.
|
||
|
|
||
|
Past advisories and other information related to computer security are
|
||
|
available for anonymous FTP from cert.org (192.88.209.5).
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
The CIAC (Computer Incident Advisory Capability) of DoE
|
||
|
|
||
|
CIAC has several self-subscribing mailing lists for electronic publications:
|
||
|
|
||
|
1. CIAC-BULLETIN for Advisories, highest priority - time critical
|
||
|
information and Bulletins, important computer security information;
|
||
|
2. CIAC-NOTES for Notes, a collection of computer security articles;
|
||
|
3. SPI-ANNOUNCE for official news about Security Profile Inspector (SPI)
|
||
|
software updates, new features, distribution and availability;
|
||
|
4. SPI-NOTES, for discussion of problems and solutions regarding the use of
|
||
|
SPI products.
|
||
|
|
||
|
To join, send e-mail to ciac-listproc@llnl.gov and, in the text of your message
|
||
|
(not the subject line), write any of the following examples:
|
||
|
|
||
|
subscribe ciac-bulletin LastName, FirstName PhoneNumber
|
||
|
subscribe ciac-notes LastName, FirstName PhoneNumber
|
||
|
subscribe spi-announce LastName, FirstName PhoneNumber
|
||
|
subscribe spi-notes LastName, FirstName PhoneNumber
|
||
|
e.g., subscribe ciac-notes O'Hara, Scarlett 404-555-1212
|
||
|
|
||
|
You will receive an acknowledgment containing address, initial PIN, and
|
||
|
information on how to change either of them, cancel your subscription, or get
|
||
|
help.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
HP, Hewlett Packard
|
||
|
|
||
|
To join, send e-mail to support@support.mayfield.hp.com and, in the text of
|
||
|
your message (not the subject line), write:
|
||
|
|
||
|
subscribe security_info
|
||
|
|
||
|
The latest digest of new HP Security Bulletins will be distributed directly to
|
||
|
your mailbox on a routine basis.
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Sun Security Alert
|
||
|
|
||
|
To join, send e-mail to security-alert@sun.com and, in the subject of your
|
||
|
message write:
|
||
|
|
||
|
SUBSCRIBE CWS your-email-addr
|
||
|
|
||
|
The message body should contain affiliation and contact information.
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Copyright
|
||
|
|
||
|
This paper is Copyright (c) 1995
|
||
|
by Christopher Klaus of Internet Security Systems, Inc.
|
||
|
|
||
|
Permission is hereby granted to give away free copies electronically. You may
|
||
|
distribute, transfer, or spread this paper electronically. You may not pretend
|
||
|
that you wrote it. This copyright notice must be maintained in any copy made.
|
||
|
If you wish to reprint the whole or any part of this paper in any other medium
|
||
|
excluding electronic medium, please ask the author for permission.
|
||
|
|
||
|
Disclaimer
|
||
|
|
||
|
The information within this paper may change without notice. Use of this
|
||
|
information constitutes acceptance for use in an AS IS condition. There are NO
|
||
|
warranties with regard to this information. In no event shall the author be
|
||
|
liable for any damages whatsoever arising out of or in connection with the use
|
||
|
or spread of this information. Any use of this information is at the user's own
|
||
|
risk.
|
||
|
|
||
|
Address of Author
|
||
|
|
||
|
Please send suggestions, updates, and comments to:
|
||
|
Christopher Klaus <cklaus@iss.net> of Internet Security Systems, Inc.
|
||
|
<iss@iss.net>
|
||
|
|
||
|
Internet Security Systems, Inc.
|
||
|
|
||
|
Internet Security Systems, Inc, located in Atlanta, Ga., specializes in the
|
||
|
developement of security scanning software tools. Its flagship product,
|
||
|
Internet Scanner, is software that learns an organization's network and probes
|
||
|
every device on that network for security holes. It is the most comprehensive
|
||
|
"attack simulator" available, checking for over 100 security vulnerabilities.
|
||
|
--
|
||
|
Christopher William Klaus Voice: (770)441-2531. Fax: (770)441-2431
|
||
|
Internet Security Systems, Inc. "Internet Scanner lets you find
|
||
|
2000 Miller Court West, Norcross, GA 30071 your network security holes
|
||
|
Web: http://iss.net/ Email: cklaus@iss.net before the hackers do."
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
Date: Sun, 19 Apr 1995 22:51:01 CDT
|
||
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
||
|
Subject: File 4--Cu Digest Header Info (unchanged since 19 Apr, 1995)
|
||
|
|
||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
||
|
available at no cost electronically.
|
||
|
|
||
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
||
|
|
||
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
||
|
60115, USA.
|
||
|
|
||
|
To UNSUB, send a one-line message: UNSUB CUDIGEST
|
||
|
Send it to LISTSERV@VMD.CSO.UIUC.EDU
|
||
|
(NOTE: The address you unsub must correspond to your From: line)
|
||
|
|
||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
||
|
the PC Telecom forum under "computing newsletters;"
|
||
|
On Delphi in the General Discussion database of the Internet SIG;
|
||
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
||
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
||
|
CuD is also available via Fidonet File Request from
|
||
|
1:11/70; unlisted nodes and points welcome.
|
||
|
|
||
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
||
|
Brussels: STRATOMIC BBS +32-2-5383119 2:291/759@fidonet.org
|
||
|
In ITALY: ZERO! BBS: +39-11-6507540
|
||
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
||
|
|
||
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
||
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
||
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
||
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
||
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
||
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
||
|
|
||
|
JAPAN: ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
||
|
|
||
|
The most recent issues of CuD can be obtained from the
|
||
|
Cu Digest WWW site at:
|
||
|
URL: http://www.soci.niu.edu:80/~cudigest/
|
||
|
|
||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
|
information among computerists and to the presentation and debate of
|
||
|
diverse views. CuD material may be reprinted for non-profit as long
|
||
|
as the source is cited. Authors hold a presumptive copyright, and
|
||
|
they should be contacted for reprint permission. It is assumed that
|
||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
||
|
specified. Readers are encouraged to submit reasoned articles
|
||
|
relating to computer culture and communication. Articles are
|
||
|
preferred to short responses. Please avoid quoting previous posts
|
||
|
unless absolutely necessary.
|
||
|
|
||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
||
|
the views of the moderators. Digest contributors assume all
|
||
|
responsibility for ensuring that articles submitted do not
|
||
|
violate copyright protections.
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
End of Computer Underground Digest #7.70
|
||
|
************************************
|
||
|
|