min.networking
Subject: computer-security/secmaillist FAQ (HTML version)
Date: 31 Jan 1997 06:07:18 GMT
.ms-windows.nt.admin.misc:29557 comp.os.ms-windows.nt.admin.networking:31448

Archive-name: computer-security/secmaillist
Posting-frequency: monthly
Version: 2.00

<TITLE>ISS: Security Mailing Lists FAQ</TITLE>

<center>
<H1>
Security Mailing Lists
</H1>
</center>

<P>
The following FAQ is a comprehensive list of security mailing
lists. These security mailing lists are important tools to network
administrators, network security officers, security consultants,
and anyone who needs to keep abreast of the most current security
information available.
<P>
<B>General Security Lists </B>
<UL>
<LI><A HREF="#lgm">8lgm (Eight Little Green Men)</A>
<LI><A HREF="#academic">Academic-Firewalls </A>
<LI><A HREF="#alert">Alert </A>
<LI><A HREF="#bestof">Best of Security</A>
<LI><A HREF="#bugtraq">Bugtraq </A>
<LI><A HREF="#coast">COAST Security Archive</A>
<LI><A HREF="#privacy">Computer Privacy Digest (CPD) </A>
<LI><A HREF="#underground">Computer Underground Digest (CuD) </A>
<LI><A HREF="#cypherpunks">Cypherpunks </A>
<LI><A HREF="#cypherpunksa">Cypherpunks-Announce </A>
<LI><A HREF="#euro">European Firewalls </A>
<LI><A HREF="#firewalls">Firewalls </A>
<LI><A HREF="#intrusion">Intruder Detection Systems </A>
<LI><A HREF="#infsec">Infsec-L</A>
<LI><A HREF="#ntsecurity">NT Security</A>
<LI><A HREF="#phrack">Phrack </A>
<LI><A HREF="#privacyforum">PRIVACY Forum </A>
<LI><A HREF="#risks">Risks </A>
<LI><A HREF="#sas">SAS (French Speaking Firewalls) </A>
<LI><A HREF="#securehttp">S-HTTP </A>
<LI><A HREF="#sneakers">Sneakers </A>
<LI><A HREF="#ssl">Secure Socket Layer - Talk </A>
<LI><A HREF="#uninfsec">UNINFSEC - University Information Security Forum </A>
<LI><A HREF="#virus">Virus </A>
<LI><A HREF="#virusalert">Virus Alert </A>
<LI><A HREF="#wwwsecurity">WWW Security </A>
</UL>

<P>
<B>Security Products </B>
<UL>
<LI><A HREF="#firewall1">Firewall-1 </A>
<LI><A HREF="#linux">Linux </A>
<LI><A HREF="#linuxsecurity">Linux Alert </A>
<LI><A HREF="#sos">SOS Freestone Firewall package</A>
<LI><A HREF="#tiger">Tiger</A>
<LI><A HREF="#tis">TIS Firewallk Toolkit </A>
</UL>

<P>
<B>Vendors and Organizations </B>
<UL>
<LI><A HREF="#cert">CERT </A>
<LI><A HREF="#ciac">CIAC </A>
<LI><A HREF="#hp">HP </A>
<li><a href="#sgi">SGI </a>
<LI><A HREF="#sun">Sun </A>
</UL>

<P>
<B>To get the newest updates of Security files check the following
services: </B>
<BLOCKQUOTE>
<A href = "mailto:info@iss.net">mail info@iss.net</A> with &quot;send
index&quot; in message <BR>
<A href = />http://www.iss.net/</A> <BR>
<A href = "ftp://iss.net/pub">ftp iss.net /pub/ </A><BR>

</BLOCKQUOTE>

<HR>

<H3><A NAME="lgm">8lgm </A>(Eight Little Green Men) </H3>

<P>
To join, send e-mail to majordomo@8lgm.org and, in the text of
your message (not the subject line), write:
<BLOCKQUOTE>
subscribe 8lgm-list
</BLOCKQUOTE>

<P>
Group of hackers that periodically post exploit scripts for various
Unix bugs. (Footnote: 8lgm originally stood for: Eight Legged
Groovin' Machine)
<HR>

<H3><A NAME="academic">Academic </A>Firewalls </H3>

<P>
To join, send e-mail to majordomo@net.tamu.edu and, in the text
of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE Academic-Firewalls
</BLOCKQUOTE>

<P>
This is an unmoderated list maintained by Texas A&amp;M University.
Its purpose is to promote the discussion and use of firewalls
and other security tools in an academic environment. It is complementary
to the Firewalls list maintained by Brent Chapman (send subscription
requests to Majordomo@GreatCircle.COM) which deals primarily with
firewall issues in a commercial environment. Academic environments
have different political structures, ethical issues, expectations
of privacy and expectations of access.
<P>
Many documented incidents of cracker intrusions have either originated
at or passed through academic institutions. The security at most
universities is notoriously lax or even in some cases completely
absent. Most institutions don't use firewalls because they either
don't care about their institution's security, they feel firewalls
are not appropriate or practical, or they don't know the extent
to which they are under attack from the Internet.
<P>
At Texas A&amp;M University we have been using a combination of
a flexible packet filter, intrusion detection tools, and Unix
security audit utilities for almost two years. We have found that
simple firewalls combined with other tools are feasible in an
academic environment. Hopefully the discussion on this list will
begin to raise the awareness of other institutions also.
<HR>

<H3><A NAME="alert">Alert </A></H3>

<P>
To join, send e-mail to <A HREF="mailto:request-alert@iss.net">request-alert@iss.net</A>
and, in the text of your message (not the subject line), write:
<PRE>
        subscribe alert
</PRE>

<P>
To remove, send e-mail to <A HREF="mailto:request-alert@iss.net">request-alert@iss.net</A>
and, in the text of your message (not the subject line), write:
<PRE>
        unsubscribe alert
</PRE>

<P>
This is a moderated list in the effort to keep the noise to a
minimal and provide quality security information. The Alert will
be covering the following topics:
<UL>
<LI>Security Product Announcements
<LI>Updates to Security Products
<LI>New Vulnerabilities found
<LI>New Security Frequently Asked Question files.
<LI>New Intruder Techniques and Awareness
</UL>

<HR>

<H3><A NAME="bestof">Best </A>of Security </H3>

<P>
To join, send e-mail to <A href = mailto:best-of-security-request@suburbia.net>best-of-security-request@suburbia.net </A>with
the following in the body of the message:
<BLOCKQUOTE>
subscribe best-of-security 
</BLOCKQUOTE>

<P>
REASONS FOR INCEPTION
<P>
In order to compile the average security administrator it was
found that the compiler had to parse a foreboding number of exceptionally
noisy and semantically-content-free data sets. This led to exceptionally
high load averages and a dramatic increase in core entropy.
<P>
Further, the number, names and locations of this data appears
to change on an almost daily basis; requiring tedious version
control on the part of the mental maintainer. Best-of-Security
is at present an un-moderated list. That may sound strange given
our stated purpose of massive entropy reduction; but because best
often equates with &quot;vital&quot; and the moderator doesn't
have an MDA habit it is important that material sent to this list
be delivered to its subscribers' in as minimal period of time
as is (in)humanly possible.
<P>
If you find *any* information from *any* source (including other
mailinglists, newsgroups, conference notes, papers, etc) that
fits into one of the acceptable categories described at the end
of this document then you should *immediately* send it to &quot;best-of-security@suburbia.net&quot;.
Do not try and predict whether or not someone else will send the
item in question to the list in the immediate future. Unless your
on a time-delayed mail vector such as polled uucp or the item
has already appeared on best-of-security, mail the info to the
list! Even if it is a widely deployed peice of information such
as a CERT advisory the proceeding argument still applies. If the
information hasn't appeared on this list yet, then SEND IT. It
is far better to run the risk of minor duplication in exchange
for having the information out where it is needed than act conservatively
about occasional doubling up on content.
<HR>

<H3><A NAME="bugtraq">Bugtraq </A></H3>

<P>
To join, send e-mail to LISTSERV@NETSPACE.ORG and, in the text
of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE BUGTRAQ 
</BLOCKQUOTE>

<P>
This list is for *detailed* discussion of UNIX security holes:
what they are, how to exploit, and what to do to fix them.
<P>
This list is not intended to be about cracking systems or exploiting
their vunerabilities. It is about defining, recognizing, and preventing
use of security holes and risks.
<P>
Please refrain from posting one-line messages or messages that
do not contain any substance that can relate to this list`s charter.
<P>
Please follow the below guidelines on what kind of information
should be posted to the Bugtraq list:
<UL>
<LI>Information on Unix related security holes/backdoors (past
and present)
<LI>Exploit programs, scripts or detailed processes about the
above
<LI>Patches, workarounds, fixes
<LI>Announcements, advisories or warnings
<LI>Ideas, future plans or current works dealing with Unix security
<LI>Information material regarding vendor contacts and procedures
<LI>Individual experiences in dealing with above vendors or security
organizations
<LI>Incident advisories or informational reporting
</UL>

<HR>

<H3><A NAME="coast">COAST </A>Security Archive </H3>

<P>
To join, send e-mail to coast-request@cs.purdue.edu and, in the
text of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE coast <YOUR email address> 
</BLOCKQUOTE>

<P>
About Purdue's COAST Security Archive
<HR>

<H3><A NAME="privacy">Computer </A>Privacy Digest </H3>

<P>
To join, send e-mail to <A href = mailto:comp-privacy-request@uwm.edu>comp-privacy-request@uwm.edu </A>and,
in the text of your message (not the subject line), write:
<BLOCKQUOTE>
subscribe cpd 
</BLOCKQUOTE>

<P>
The Computer PRIVACY Digest (CPD) (formerly the Telecom Privacy
digest) is run by Leonard P. Levine. It is gatewayed to the USENET
newsgroup comp.society.privacy. It is a relatively open (i.e.,
less tightly moderated) forum, and was established to provide
a forum for discussion on the effect of technology on privacy.
All too often technology is way ahead of the law and society as
it presents us with new devices and applications. Technology can
enhance and detract from privacy. 
<HR>

<H3><A NAME="underground">Computer </A>Underground Digest </H3>

<P>
To join, send e-mail to <A href = mailto:CU-DIGEST-REQUEST@WEBER.UCSD.EDU> CU-DIGEST-REQUEST@WEBER.UCSD.EDU </A>and,
in the text of your message (not the subject line), write:
<BLOCKQUOTE>
SUB CUDIGEST 
</BLOCKQUOTE>

<P>
CuD is available as a Usenet newsgroup: comp.society.cu-digest
<P>
Covers many issues of the computer underground. 
<HR>

<H3><A NAME="cypherpunks">Cypherpunks </A></H3>

<P>
To join, send e-mail to majordomo@toad.com and, in the text of
your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE cypherpunks
</BLOCKQUOTE>

<P>
The cypherpunks list is a forum for discussing personal defenses
for privacy in the digital domain. It is a high volume mailing
list. <A NAME="cypherpunksa"></A>
<HR>

<H3><A NAME="cannounce">Cypherpunks </A>Announce </H3>

<P>
To join, send e-mail to majordomo@toad.com and, in the text of
your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE cypherpunks-announce
</BLOCKQUOTE>

<P>
There is an announcements list which is moderated and has low
volume. Announcements for physical cypherpunks meetings, new software
and important developments will be posted there.
<HR>

<H3><A NAME="euro">Euro </A>Firewalls</H3>

<P>
To join, send e-mail to majordomo@gbnet.net and, in the text of
your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE firewalls-uk email-addr
</BLOCKQUOTE>

<P>
Euro flavour firewall list.
<HR>

<H3><A NAME="firewalls">Firewalls</A></H3>

<P>
To join, send e-mail to majordomo@greatcircle.com and, in the
text of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE firewalls
</BLOCKQUOTE>

<P>
Useful information regarding firewalls and how to implement them
for security.
<P>
This list is for discussions of Internet &quot;firewall&quot;
security systems and related issues. It is an outgrowth of the
Firewalls BOF session at the Third UNIX Security Symposium in
Baltimore on September 15, 1992.
<HR>

<H2><A NAME="infsec">INFSEC</A>-L Information Systems Security
Forum </H2>

<P>
To join, send e-mail to listserv@etsuadmn.etsu.edu and, in the
text of your message (not the subject line), write:
<BLOCKQUOTE>
SUB infsec-l your-name
</BLOCKQUOTE>

<P>
INFSEC-L is for discussions of information systems security and
related issues. Discussions are not moderated. Thus, all messages
sent to the list are immediately distributed to members of the
list. The discussion list is an outgrowth of the &quot;Technology
for the Information Security '94: Managing Risk&quot; at Galveston,
TX (December 5-8, 1994). The main objective of the list is to
foster open and constructive communication among information systems
security and auditing professionals in government, industry, and
academic institutions. Initial subscriptions are screened by the
listowner to ensure that only appropriate professionals are subscribed.
<HR>

<H3><A NAME="intrusion">Intrusion </A>Detection Systems </H3>

<P>
To join, send e-mail to <A href = mailto:majordomo@uow.edu.au>majordomo@uow.edu.au </A>with
the following in the body of the message:
<BLOCKQUOTE>
subscribe ids 
</BLOCKQUOTE>

<P>
The list is a forum for discussions on topics related to development
of intrusion detection systems.
<P>
Possible topics include: 
<UL>
<LI>techniques used to detect intruders in computer systems and
computer networks
<LI>audit collection/filtering 
<LI>subject profiling
<LI>knowledge based expert systems 
<LI>fuzzy logic systems
<LI>neural networks 
<LI>methods used by intruders (known intrusion scenarios)
<LI>cert advisories 
<LI>scripts and tools used by hackers
<LI>computer system policies 
<LI>universal intrusion detection system
</UL>

<HR>
<H3><A NAME="ntsecurity">NT Security </A></H3>

<P>
To join, send e-mail to <A HREF="mailto:request-ntsecurity@iss.net">request-ntsecurity@iss.net</A>
and, in the text of your message (not the subject line), write:
<PRE>
        subscribe ntsecurity
</PRE>

<P>
To remove, send e-mail to <A HREF="mailto:request-ntsecurity@iss.net">request-ntsecurity@iss.net</A>
and, in the text of your message (not the subject line), write:
<PRE>
        unsubscribe ntsecurity
</PRE>


<center>NT Security Mailing List</center>
<br>
This is an unmoderatedmailing list discussing Windows NT security as well
as the Windows 95 and Windows For Work Group security issues.
<br>
The issues discussed will be everything at the host and application level
security as well as at the network level.
<p>

There are archives available at 
<a href = http://www.iss.net/lists> http://www.iss.net/lists </a> and
<a href = ftp://ftp.iss.net/pub/lists/ntsecurity-digest.archive/>
ftp://ftp.iss.net/pub/lists/ntsecurity-digest.archive/</a>
<hr>

<H3><A NAME="phrack">Phrack </A></H3>

<P>
To join, send e-mail to phrack@well.com and, in the text of your
message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE Phrack
</BLOCKQUOTE>

<P>
Phrack is a Hacker Magazine which deals with phreaking and hacking.
<HR>

<H3><A NAME="privacyforum">PRIVACY </A>Forum </H3>

<P>
To join, send e-mail to privacy-request@vortex.com and, in the
text of your message (not the subject line), write:
<BLOCKQUOTE>
information privacy
</BLOCKQUOTE>

<P>
The PRIVACY Forum is run by Lauren Weinstein. He manages it as
a rather selectively moderated digest, somewhat akin to RISKS;
it spans the full range of both technological and non-technological
privacy-related issues (with an emphasis on the former).
<HR>

<H3><A NAME="risks">Risks </A></H3>

<P>
To join, send e-mail to risks-request@csl.sri.com and, in the
text of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE
</BLOCKQUOTE>

<P>
Risks is a digest that describes many of the technological risks
that happen in today's environment.
<HR>

<H3><A NAME="sas">SAS </A>(French Speaking Firewalls) </H3>

<P>
To join, send e-mail to majordomo@edelweb.fr and, in the text
of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE sas
</BLOCKQUOTE>

<P>
Cette liste est destinee a la discussion sur la securisation des
acces Internet, principalement a propos des solutions de type
&quot;Firewall&quot; (sas de securite, coupe-feu ou garde-barriere).
<HR>

<H3><A NAME="securehttp">Secure </A>HTTP </H3>

<P>
To join, send e-mail to shttp-talk-request@OpenMarket.com and,
in the text of your message (not the subject line), write: 
<BLOCKQUOTE>
SUBSCRIBE
</BLOCKQUOTE>

<P>
Secure NCSA httpd is a World-Wide Web (WWW) server supporting
transaction privacy and authentication for Secure WWW clients
over the Internet using the Secure HyperText Transfer Protocol
(S-HTTP). Secure NCSA httpd was developed by Enterprise Integration
Technologies in cooperation with RSA Data Security and the National
Center for Supercomputing Applications at the University of Illinois,
Urbana-Champaign.
<P>
The purpose of this mailing list(shttp-talk) is to allow people
who are interested in potentially using SHTTP to ask questions,
air issues, express concerns and discuss the specification and
reference implementation. Information about Secure HTTP can be
found on the CommerceNet WWW server. Here is the URL to take you
directly to the pertinent info:
<P>
<A href = http://www.commerce.net/software/Shttpd/Docs/manual.html>http://www.commerce.net/software/Shttpd/Docs/manual.html </A>
<HR>

<H3><A NAME="sneakers">Sneakers </A></H3>

<P>
To join, send e-mail to majordomo@CS.YALE.EDU and, in the text
of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE Sneakers
</BLOCKQUOTE>

<P>
The Sneakers mailing list is for discussion of LEGAL evaluations
and experiments in testing various Internet &quot;firewalls&quot;
and other TCP/IP network security products.
<UL>
<LI>Vendors are welcome to post challenges to the Internet network
security community
<LI>Internet users are welcome to post anecdotal experiences regarding
(legally) testing the defenses of firewall and security products.

<LI>&quot;Above board&quot; organized and/or loosely organized
wide area tiger teams (WATTs) can share information, report on
their progress or eventual success here.
</UL>

<P>
There is a WWW page with instructions on un/subscribing as well
as posting, and where notices and pointers to resources (especially
if I set up an archive of this list) may be put up from time to
time:
<P>
<A href = http://www.cs.yale.edu/HTML/YALE/CS/HyPlans/long-morrow/sneakers.html>http://www.cs.yale.edu/HTML/YALE/CS/HyPlans/long-morrow/sneakers.html </A>
<HR>

<H3><A NAME="ssl">Secure </A>Socket Layer - Talk </H3>

<P>
To join, send e-mail to ssl-talk-request@netscape.com and, in
the text of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE
</BLOCKQUOTE>

<P>
Mailing list to discuss secure sockets layer - Netscape's (and,
increasingly, others') approach to providing encryption and authentication
for IP-based services (primarily http, but expanding to address
telnet and ftp as well).
<HR>

<H3><A NAME="uninfsec">UNINFSEC </A>- University Information Security
Forum </H3>

<P>
To join, send e-mail to listserv@cuvmc.ais.columbia.edu and, in
the text of your message (not the subject line), write:
<BLOCKQUOTE>
subscribe uninfsec
</BLOCKQUOTE>

<P>
This is a closed, unmoderated discussion list for people that
have information security responsibilities in their jobs and who
work for educational institutions or have a close relation with
education. Discussions range from policy discussions, awareness
programs, virus protection, change control, privileges, monitoring,
risk assessments, auditing, business resumption, etc.
<HR>

<H2><A NAME="virus">Virus </A></H2>

<P>
To join, send e-mail to LISTSERV@lehigh.edu and, in the text of
your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE virus-l your-name
</BLOCKQUOTE>

<P>
It is an electronic mail discussion forum for sharing information
and ideas about computer viruses, which is also distributed via
the Usenet Netnews as comp.virus. Discussions should include (but
not necessarily be limited to): current events (virus sightings),
virus prevention (practical and theoretical), and virus related
questions/answers. The list is moderated and digested. That means
that any message coming in gets sent to me, the editor. I read
through the messages and make sure that they adhere to the guidelines
of the list (see below) and add them to the next digest. Weekly
logs of digests are kept by the LISTSERV (see below for details
on how to get them). For those interested in statistics, VIRUS-L
is now up to about 2400 direct subscribers. Of those, approximately
10% are local redistribution accounts with an unknown number of
readers. In addition, approximately 30,000-40,000 readers read
comp.virus on the USENET. 
<HR>

<H3><A NAME="virusalert">Virus </A>Alert </H3>

<P>
To join, send e-mail to LISTSERV@lehigh.edu and, in the text of
your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE valert-l your-name
</BLOCKQUOTE>

<P>
What is VALERT-L?
<P>
It is an electronic mail discussion forum for sharing urgent virus
warnings among other computer users. Postings to VALERT-L are
strictly limited to warnings about viruses (e.g., &quot;We here
at University/Company X just got hit by virus Y - what should
we do?&quot;). Followups to messages on VALERT-L should be done
either by private e-mail or to VIRUS-L, a moderated, digested,
virus discussion forum also available on this LISTSERV, LISTSERV@LEHIGH.EDU.
Note that any message sent to VALERT-L will be cross-posted in
the next VIRUS-L digest. To preserve the timely nature of such
warnings and announcements, the list is moderated on demand (see
posting instructions below for more information).
<P>
What VALERT-L is *not*?
<P>
A place to to anything other than announce virus infections or
warn people about particular computer viruses (symptoms, type
of machine which is vulnerable, etc.).
<HR>

<H3><A NAME="wwwsecurity">WWW </A>Security </H3>

<P>
To join, send e-mail to www-security-request@nsmx.rutgers.edu
and, in the text of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE www-security your_email_address
</BLOCKQUOTE>

<P>
The list is maintained by the www-security team of Network Services,
Rutgers University Telecommunications Division.
<P>
www-security is the official mailing list of the IETF Web Transaction
Security Working Group. While there are many approaches to providing
security services in the Web, most of the current work is concerned
with securing the HyperText Transport Protocol. Because of (1)
the great need for quick implementation of Web security services,
(2) HTTP-level solutions cover a wide range of WWW applications,
and (3) the IETF is a proven forum for promoting standards to
vendors and the international networking community, we suggest
that the list focus and development of Internet standards and
related documents for secure services within HTTP. 
<HR>

<H2>Security Products </H2>

<HR>

<H3><A NAME="firewall1">Firewall</A>-1 </H3>

<P>
To join, send e-mail to majordomo@applicom.co.il and, in the text
of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE firewall-1
</BLOCKQUOTE>

<P>
This list is for discussions of &quot;FireWall-1&quot; issues:
problems and (hopefully) their solution(s), requests for information,
and ideas one wishes to share. The FireWall-1 list is open to
the worldwide Unix community, which consists of commercial, educational,
and private users. 
<HR>

<H3><A NAME="linux">Linux </A>Security </H3>

<P>
To join, send e-mail to majordomo@redhat.com and, in the text
of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE linux-security your-name
<br>
or
<br>
SUBSCRIBE linux-security-digest your-name

</BLOCKQUOTE>

<P>
What we offer to do is set up a mechanism for Linux that is able
to distribute security-relevant information to Linux users or
administrators that run a networked Linux box. This would allow
them to plug any holes early on, without having to scan all Linux
newsgroups and mailing lists all of the time.
<HR>

<H3><A NAME="linuxsecurity">Linux </A>Security Alert</H3>

<P>
To join, send e-mail to majordomo@redhat.com and, in the text
of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE linux-alert your-name 
<br>
or
<br>
SUBSCRIBE linux-alert-digest your-name 
</BLOCKQUOTE>

<P>
This is the announcement list. It is mainly for postings about
security holes, and how to plug them.
<HR>

<H3><A NAME="sos">SOS </A>Freestone Firewall package </H3>

<P>
To join, send e-mail to majordomo@majordomo.soscorp.com and, in
the text of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE freestone
</BLOCKQUOTE>

<P>
The list is dedicated to the users and administrators of the free
SOS firewall package, Freestone.
<P>
For more information, see <A href = http://www.soscorp.com>http://www.soscorp.com </A>.

<HR>

<H3><A NAME="tiger">Tiger </A></H3>

<P>
To join, send e-mail to majordomo@net.tamu.edu and, in the text
of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE tiger
</BLOCKQUOTE>

<P>
Discussion list for the UNIX security audit tool TIGER
<P>
This is the TIGER users mailling list. It is for:
<OL>
<LI>Update announcements
<LI>Reporting bugs in TIGER.
<LI>Discussing new features for TIGER.
<LI>Discussing use of TIGER.
<LI>Discussing anything else about TIGER.
</OL>

<P>
What is TIGER?
<P>
TIGER is a set of shell scripts, C code and configuration files
which are used to perform a security audit on UNIX systems. The
goals for TIGER are to make it very robust and easy to use. TIGER
was originally developed for checking hosts at Texas A&amp;M University
following a break in in the Fall of 1992.
<P>
The latest version of TIGER is always available from the directory
net.tamu.edu:/pub/security/TAMU. In addition, updated digital
signature files for new platforms and new security patches will
be maintained in the directory:
<P>
net.tamu.edu:/pub/security/TAMU/tiger-sigs.
<HR>

<H3><A NAME="tis">TIS </A>Firewall Toolkit </H3>

<P>
To join, send e-mail to fwall-users-request@tis.com and, in the
text of your message (not the subject line), write:
<BLOCKQUOTE>
SUBSCRIBE 
</BLOCKQUOTE>

<P>
Discussion list for the TIS firewall toolkit
<HR>

<H2>Vendors and Organizations </H2>

<HR>

<H3><A NAME="cert">CERT </A>(Computer Emergency Response Team)
Advisory mailing list.</H3>

<P>
To join, send e-mail to cert@cert.org and, in the text of your
message (not the subject line), write:
<BLOCKQUOTE>
I want to be on your mailing list. 
</BLOCKQUOTE>

<P>
Past advisories and other information related to computer security
are available for anonymous FTP from <A href = ftp://cert.org/>cert.org (192.88.209.5). </A>
<HR>

<H3>The <A NAME="ciac">CIAC </A>(Computer Incident Advisory Capability)
of DoE</H3>

<P>
CIAC has several self-subscribing mailing lists for electronic
publications:
<OL>
<LI>CIAC-BULLETIN for Advisories, highest priority - time critical
information and Bulletins, important computer security information;
<LI>CIAC-NOTES for Notes, a collection of computer security articles;
<LI>SPI-ANNOUNCE for official news about Security Profile Inspector
(SPI) software updates, new features, distribution and availability;
<LI>SPI-NOTES, for discussion of problems and solutions regarding
the use of SPI products.
</OL>

<P>
To join, send e-mail to <A href = ciac-listproc@llnl.gov>ciac-listproc@llnl.gov </A>and,
in the text of your message (not the subject line), write any
of the following examples:
<BLOCKQUOTE>
subscribe ciac-bulletin LastName, FirstName PhoneNumber <BR>
subscribe ciac-notes LastName, FirstName PhoneNumber <BR>
subscribe spi-announce LastName, FirstName PhoneNumber <BR>
subscribe spi-notes LastName, FirstName PhoneNumber <BR>
e.g., subscribe ciac-notes O'Hara, Scarlett 404-555-1212
</BLOCKQUOTE>

<P>
You will receive an acknowledgment containing address, initial
PIN, and information on how to change either of them, cancel your
subscription, or get help.
<HR>

<H3><A NAME="hp">HP</A>, Hewlett Packard </H3>

<P>
To join, send e-mail to <A href = mailto:support@support.mayfield.hp.com>support@support.mayfield.hp.com </A>and,
in the text of your message (not the subject line), write:
<BLOCKQUOTE>
subscribe security_info
</BLOCKQUOTE>

<P>
The latest digest of new HP Security Bulletins will be distributed
directly to your mailbox on a routine basis. 


<h3><a name="sgi"> SGI </h3> Wiretap
<p>
wiretap is an electronic mailing list service that Silicon Graphics, Inc. provides freely for the
security minded community. Members of this mailing list receive (via email) SGI Security
Advisories. Individuals interested in this service can subscribe to this mailing list by following
the steps below.
<p>
To join, send e-mail to external-majordomo@postofc.corp.sgi.com
and in the text of your message (not the subject line), write:
<blockquote>
     subscribe wiretap
</blockquote>



<A NAME="sun"></A>
<HR>

<H3>Sun Security Alert </H3>

<P>
To join, send e-mail to <A href = mailto:security-alert@sun.com>security-alert@sun.com </A>and,
in the subject of your message write:
<BLOCKQUOTE>
SUBSCRIBE CWS your-email-addr
</BLOCKQUOTE>

<P>
The message body should contain affiliation and contact information.

<HR>

<H3><A NAME="acknowledge">Acknowledgements</A></H3>

<P>
I would like to thank the following people for the contribution
to this FAQ that has helped to update and shape it:
<UL>
<LI>Steve Kennedy (steve@gbnet.org)
<LI>Jacob Langseth (jacob@esisys.com)
<LI>Dave Millar (millar@pobox.upenn.edu)
<LI>Bill Bauriedel (Bill.Bauriedel@Forsythe.Stanford.EDU)
<LI>Seth Robertson (seth@soscorp.com)
<LI>Marc Baudoin (Marc.Baudoin@hsc.fr.net)
</UL>

<hr>
<copyright>
<h3>Copyright</h3>

<pre>
This paper is Copyright (c) 1994, 1995, 1996
   by Christopher Klaus of Internet Security Systems, Inc. 
</pre>
<p>
Permission is hereby granted to give away free copies electronically.  You may
distribute, transfer, or spread this paper electronically.  You may not 
pretend that you wrote it.  This copyright notice must be maintained in any
copy made.  If you wish to reprint the whole or any part of this paper in any
other medium excluding electronic medium, please ask the author for permission.
</copyright>

<h3>Disclaimer</h3>
<p>
.The information within this paper may change without notice. Use of
this information constitutes acceptance for use in an AS IS condition.
There are NO warranties with regard to this information. In no event shall
the author be liable for any damages whatsoever arising out of or in
connection with the use or spread of this information.  Any use of this
information is at the user's own risk.
</p>

<h3>Address of Author</h3>

<p>
Please send suggestions, updates, and comments to:.
<address>
Christopher Klaus 
<a href=mailto:cklaus@iss.net>&#60;cklaus@iss.net&#62;</a>
of Internet Security Systems, Inc. 
<a href=mailto:iss@iss.net>&#60;iss@iss.net&#62;</a>
</address>

</PRE>
</BODY>
<p>
<h3>Internet Security Systems, Inc. </h3>
ISS is the leader in network security tools and technology through 
innovative audit, correction, and monitoring software. The Atlanta-based 
company's flagship product, Internet Scanner, is the leading commercial 
attack simulation and security audit tool. The Internet Scanner 
SAFEsuite is based upon ISS' award-winning Internet Scanner and was 
specifically designed with expanded capabilities to assess a variety of 
network security issues confronting web sites, firewalls, servers and 
workstations. The Internet Scanner SAFEsuite is the most comprehensive 
security assessment tool available.  For more information about ISS or 
its products, contact the company at (770) 395-0150 or e-mail at 
iss@iss.net. ISS maintains a Home Page on the World Wide Web at 
http://www.iss.net
-- 
Christopher William Klaus            Voice: (770)395-0150. Fax: (770)395-1972
Internet Security Systems, Inc.              "Internet Scanner SAFEsuite finds
Ste. 660,41 Perimeter Center East,Atlanta,GA 30346 your network security holes
Web: http://www.iss.net/  Email: cklaus@iss.net        before the hackers do."
