18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Appendix E] Electronic Resources<br />

E.1 Mailing Lists<br />

There are many mailing lists that cover security-related material. We describe a few of the major ones<br />

here. However, this is not to imply that only these lists are worthy of mention! There may well be other<br />

lists of which we are unaware, and many of the lesser-known lists often have a higher volume of good<br />

information.<br />

NOTE: Never place blind faith in anything you read in a mailing list, especially if the list is<br />

unmoderated. There are a number of self-styled experts on the net who will not hesitate to<br />

volunteer their views, whether knowledgeable or not. Usually their advice is benign, but<br />

sometimes it is quite dangerous. There may also be people who are providing bad advice on<br />

purpose, as a form of vandalism. And certainly there are times where the real experts make a<br />

mistake or two in what they recommend in an offhand note posted to the net.<br />

There are some real experts on these lists who are (happily) willing to share their knowledge<br />

with the community, and their contributions make the <strong>Internet</strong> a better place. However, keep<br />

in mind that simply because you read it on the network does not mean that the information is<br />

correct for your system or environment, does not mean that it has been carefully thought out,<br />

does not mean that it matches your site policy, and most certainly does not mean that it will<br />

help your security. Always evaluate carefully the information you receive before acting on it.<br />

E.1.1 Response Teams and Vendors<br />

Many of the incident response teams (listed in Appendix F) have mailing lists for their advisories and<br />

alerts. If you can be classified as one of their constituents, you should contact the appropriate team(s) to<br />

be placed on their mailing lists.<br />

Many vendors also have mailing lists for updates and advisories concerning their products. These include<br />

computer vendors, firewall vendors, and vendors of security software (including some freeware and<br />

shareware products). You may wish to contact your vendors to see if they have such lists, and if so, join.<br />

E.1.2 A Big Problem With Mailing Lists<br />

The problem with all these lists is that you can easily overwhelm yourself. If you are on lists from two<br />

response teams, four vendors, and another half-dozen general-purpose lists, you may find yourself<br />

filtering several hundred messages a day whenever a new general vulnerability is discovered. At the<br />

same time, you don't want to unsubscribe from these lists, because you might then miss the timely<br />

announcement of a special-case fix for your own systems.<br />

One method that we have seen others use with some success is to split the mailing lists up among a group<br />

of administrators. Each person gets one or two lists to monitor, with particularly useful messages then<br />

redistributed to the entire group. Be certain to arrange coverage of these lists if someone leaves or goes<br />

on vacation, however!<br />

Another approach is to feed these messages into Usenet newsgroups you create locally especially for this<br />

purpose. This strategy allows you to read the messages using an advanced newsreader that will allow you<br />

to kill message chains or trigger on keywords. It may also help provide an archiving mechanism to allow<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/appe_01.htm (2 of 5) [2002-04-12 10:45:22]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!