Server Security

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Server Security News

Securing Sendmail with TLS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One of the most common uses of network systems is for e-mail-based communications. As such, a great deal of attention has been given to securing e-mail systems. However, most of this focus has been in two areas: security at the message . . .

ComputerWorld: Security Statistics

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A nice account of the costs associated with attacks and computer security. " The threat from computer crimes and other online security breaches has barely slowed, never mind stopped, according to a recent survey of 538 security professionals in U.S. corporations . . .

Buffer overflow bug shakes Quake

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security flaw involving the server software that allows Quake III players to play the popular shoot-them-up over a network has been reported. According to a posting on respected security mailing list BugTraq, a buffer overflow vulnerability in Quake III Arena . . .

AS/400 Internet Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The focus of Internet security is to ensure private, authenticated communications between parties over the Internet or Intranets. Many of the security requirements are not that different from the requirements within a closed system complex. A closed system complex, however, may . . .

Apache avoids most security woes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Apache Software Foundation Inc.'s Apache HTTP Server has earned what many hope for and few achieve: an enviable security reputation. This achievement is especially striking when contrasted with Microsoft Corp.'s IIS (Internet Information Services) Web server (see story), which has . . .

Hardening BSD

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hardening BSD is definitely trickier than hardening a Linux based workstation being that the top 3 distributions of BSD, Net, Open, Free, have done an excellent job of strengthening the systems on their own. Using FreeBSD at home while I write . . .

MAPS Subscription Policy Changes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Economic conditions and an apparent decision to start a fee-based service will force access to MAPS services to cease. A post from mail-abuse.org to the net-abuse.email newsgroup has started some controversy over MAPS' intentions, finding replacements for their service, and basically what should be done next.. . .

Using PHP Securely

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The following article tries to explain how to use PHP on your server in a secure manner. This includes how to safely install it, remove samples and set up security specific options. It is very important to make sure that the . . .

Kernel Security Extensions USENIX BOF Summary

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Emily Ratliff posted a summary of the recent USENIX "Birds of a Feather" (BOF) discussion about the Linux Security Module effort. This effort is trying to devise a set of Linux kernel hooks to support "plugging in" to Linux support for advanced security policies.. . .

Tools of the Trade: Part 1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Now, in this short series of articles, I'm going to delve deeper into Linux security and discuss protective measures such as VPN systems and tripwire. Even though I'm aware of the many different security analysis tools out there, I'm not experienced . . .

Web Security: Apache and mod_ssl

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As we covered in the last article, SSL/TLS (Secure Socket Layer/Transport Layer Security) are the protocols used to add encryption and authentication to TCP/IP and HTTP. In this article we'll cover the most popular open source method of adding SSL/TLS to a web server. Adding mod_ssl to Apache.. . .

Security bugfix for Samba

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A serious security hole has been discovered in all versions of Samba that allows an attacker to gain root access on the target machine for certain types of common Samba configuration. Until all vendors have released updates, there is an interim workaround available. . . .

Saving face: Tripwire for Web Pages

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is a great security utility to be sure, but what about non-system files like those that constitute your Web site? Never fear: Tripwire, in partnership with Covalent, has recently released Tripwire for Web Pages into its security software stable. Tripwire . . .

Security geek developing WinXP raw socket exploit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security specialist Steve Gibson has created quite a fracas with his increasingly vocal opposition to the raw-socket connectivity planned for Windows-XP, and upon which he bases predictions of impending chaos for the entire Internet, so he's decided to exploit the very threat he claims will make the Internet permanently unstable.. . .

ISS Xforce: BIND Inadvertent Local Exposure of HMAC-MD5 (TSIG) Keys

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A flaw exists in the dnskeygen utility under BIND version 8 and the dnssec-keygen utility included with BIND version 9. The keys generated by these utilities are stored in two files. In the case of HMAC-MD5 shared secret keys that are used for dynamic updates to DNS servers, the same secret keying material is present in both files. Only one of the files is configured by default with strong access control. The resulting exposure may allow unauthorized local users to obtain the keying information. This may allow attackers to update DNS servers that support dynamic DNS updates.. . .

Securing Java Code: Part 4, Decompilers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

ava programs are especially vulnerable to decompilers, because Java source code is compiled to Java bytecode. But there are techniques to make decompilation harder. It is a difficult prospect to take machine level code and translate it backwards into language level . . .