Date: Wed, 24 Nov 1999 04:22:56 +0800 (WST) From: Michael Kennett <mike@laurasia.com.au> To: mark@grondar.za (Mark Murray) Cc: current@FreeBSD.ORG Subject: Re: FreeBSD security auditing project. Message-ID: <199911232022.EAA19557@laurasia.com.au> In-Reply-To: <199911231905.VAA80946@gratis.grondar.za> from Mark Murray at "Nov 23, 99 09:05:25 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
> Hello FreebSD'ers! > [snip] > > I have been charged with the duty of ensuring that FreeBSD gets a > security audit that has the credibility of OpenBSD's. > > Consider this to be a request-for-discussion that will head us over to > the actual work of getting it done. [snip] Great idea. Here are some sites on the web that might be of interest: Security Bugware: http://oliver.efri.hr/~crv/security/ (Nice site, seems to be updated regularly) Security Focus: http://www.securityfocus.com/vdb (Vulnerability database -- a lot of the stuff seems to come from bugtraq) Phrack: http://www.phrack.com/ (Some of the recent phracks have been great. Check out: p48-13: TCP/IP SYN Flooding *** p49-14: Smashing the stack for Fun and Profit (READ IT!) p49-15: PortScanning without the SYN flag p51-05: File Descriptor Hijacking p51-11: The Art of Portscanning p52-16: Piercing Firewalls p53-06: T/TCP Vulnerabilities p54-06: The Belt-and-Suspenders Approach. OpenBSD security p55-08: The Frame Pointer Overwrite ) Regards, Mike Kennett (mike@laurasia.com.au) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199911232022.EAA19557>