LWN.net Logo

Security index

This index covers articles that appeared in LWN on various security-related topics. Articles from 2007 on are indexed here.

Android

ABS: Android security underpinnings (February 28, 2013)

Anonymity

Eavesdropping on Tor traffic (September 12, 2007)

TorProxy and Shadow (October 14, 2009)

The Amnesic Incognito Live System: A live CD for anonymity (April 27, 2011)

Phantom: Decentralized anonymous networking (June 8, 2011)

GNUnet adds VPN, direct wireless peering, and more (December 21, 2011)

Tor offers SSL obfuscation for users behind censorship walls (February 15, 2012)

Whonix for anonymity (October 17, 2012)

DeadDrop and Strongbox (May 22, 2013)

Tor and browser vulnerabilities (August 7, 2013)

Apache

Apache attacked by a "slow loris" (June 24, 2009)

Apache range request denial of service (August 31, 2011)

AppArmor

Linux security non-modules and AppArmor (June 27, 2007)

The future of AppArmor (October 17, 2007)

TOMOYO Linux and pathname-based security (April 14, 2008)

Application binary interface (ABI)

Cascading security updates (February 27, 2008)

Authentication

Fedora accepting YubiKey one-time passwords (October 13, 2010)

OATH: yesterday, today, and tomorrow (December 15, 2010)

Trusted internet identity (January 12, 2011)

The end of OpenID? (February 2, 2011)

BrowserID: A new web authentication scheme (July 27, 2011)

Password storage on Android devices (August 3, 2011)

SSSD: System Security Services Daemon (September 27, 2011)

Enforcing password strength (October 12, 2011)

A Periodic Table of password managers (November 9, 2011)

FreeIPA: centralized identity management for Linux (December 11, 2012)

PyCon: Mozilla Persona (March 20, 2013)

Biometric

Fingerprint recognition using fprint (November 21, 2007)

Biometrics for identification (April 2, 2008)

A look at PAM face-recognition authentication (November 7, 2012)

Bypass

Authentication bypass in routers (March 5, 2008)

Automotive

Linux and automotive computing security (October 10, 2012)

Backdoors

The backdooring of WordPress (March 7, 2007)

The backdooring of SquirrelMail (December 19, 2007)

A backdoor in UnrealIRCd (June 16, 2010)

Berkeley Internet Name Daemon (BIND)

Cache poisoning vulnerability found in BIND (July 25, 2007)

The dangers of weak random numbers (February 20, 2008)

Books

Book Review: Hacking VoIP (January 28, 2009)

Book review: Nmap Network Scanning (February 18, 2009)

Botnets

Storm worm gains strength (August 29, 2007)

ITU getting serious about botnets (November 28, 2007)

Storm botnet used to study spam (November 12, 2008)

Linux botnets (March 25, 2009)

SCALE 8x: Ten million and one penguins (March 10, 2010)

Browser cookies

Session cookies for web applications (May 21, 2008)

Another kind of cookie (October 29, 2008)

Should web developers say no to cookie-based authentication? (March 24, 2010)

BruCON

2009

BruCON: Can we trust cryptography? (September 30, 2009)

BSD

Capsicum: practical capabilities for UNIX (February 22, 2012)

Bug reporting

Counting vulnerabilities (June 22, 2007)

Cascading security updates (February 27, 2008)

Secrecy and the DNS flaw (July 9, 2008)

Injunction lifted against MIT students (August 20, 2008)

Partial disclosure (October 8, 2008)

Distribution advisories (November 26, 2008)

"Vishing" advisory targets Asterisk (December 17, 2008)

Vulnerability disclosure policies (July 7, 2010)

The future of vendor-sec (March 9, 2011)

Python vulnerability disclosure (April 27, 2011)

An odd vulnerability report for LibreOffice (October 5, 2011)

How long should security embargoes be? (February 8, 2012)

GitHub incidents spawns Rails security debate (March 7, 2012)

Responsible disclosure in open source: The crypt() vulnerability (June 6, 2012)

Stockpiling zero-day vulnerabilities (August 15, 2012)

A story of three kernel vulnerabilities (February 19, 2013)

Mayhem finds 1200 bugs (July 3, 2013)

Subverting Android package verification (July 10, 2013)

Capabilities

Capsicum: practical capabilities for UNIX (February 22, 2012)

CAP_SYS_ADMIN: the new root (March 14, 2012)

The trouble with CAP_SYS_RAWIO (March 13, 2013)

CAPTCHA

Breaking CAPTCHA (March 19, 2008)

CERT

GCC and pointer overflows (April 16, 2008)

Certificate Authorities (CAs)

Mozilla and CNNIC (February 3, 2010)

EFF analyzes SSL certificates and certificate authorities (August 11, 2010)

The case of the fraudulent SSL certificates (March 23, 2011)

Fallout from the fraudulent SSL certificates (March 30, 2011)

Certificates and "authorities" (September 7, 2011)

Convergence: User-controlled SSL certificate checking (October 19, 2011)

A ".secure" top-level domain (May 16, 2012)

Cyberoam deep packet inspection and certificates (July 11, 2012)

Certifications

Red Hat and IBM get certified (June 20, 2007)

Fedora and CAPP (December 10, 2008)

chroot()

What chroot() is really for (October 3, 2007)

Code scanning

Mayhem finds 1200 bugs (July 3, 2013)

Containers

Linux capabilities support for user namespaces (December 22, 2010)

LSS: Secure Linux containers (September 6, 2012)

Cross-site scripting (XSS)

Extended Validation certificates and cross-site scripting (March 12, 2008)

Mozilla's Content Security Policy (July 1, 2009)

Cross-site scripting here at LWN (November 4, 2009)

Chrome reflective XSS protection (November 4, 2009)

LCA: CSP for cross-site scripting protection (February 6, 2013)

Cryptography

BruCON: Can we trust cryptography? (September 30, 2009)

Bitcoin: Virtual money created by CPU cycles (November 10, 2010)

Desktop Summit: Crypto consolidation (August 10, 2011)

On keys, trust, and webs (October 5, 2011)

Forward secure sealing (August 22, 2012)

Desktop

Desktop malware risk gets raised and patched (February 25, 2009)

A desktop "secrets" API (July 29, 2009)

Linux malware: an incident and some solutions (December 23, 2009)

Where are the non-root X servers? (September 8, 2010)

Linux autorun vulnerabilities? (February 9, 2011)

Libsecret revealed (April 4, 2012)

The perils of desktop tracking (April 18, 2012)

GUADEC: Imagining Tor built-in to GNOME (August 8, 2012)

A look at PAM face-recognition authentication (November 7, 2012)

Security implications for user interface changes? (November 28, 2012)

Prompt-free security for GNOME (August 14, 2013)

Detecting vulnerabilities

Capturing web attacks with open proxy honeypots (July 3, 2007)

Bluepot: A honeypot for Bluetooth attacks (February 16, 2011)

Deterministic builds

Verifying the source code for binaries (June 26, 2013)

Security software verifiability (August 21, 2013)

Binary "diversity" (August 28, 2013)

Distributions

ParanoidLinux: from fiction to reality (October 1, 2008)

Tin Hat: secured by running from RAM (March 18, 2009)

BackTrack 4: the security professional's toolbox (January 20, 2010)

Fedora 13 to debut a security "spin" (March 3, 2010)

IPFire 2.5: Firewalls and more (April 28, 2010)

Qubes: security by virtualization (May 5, 2010)

Lightweight Portable Security (December 15, 2010)

Deliberately insecure Linux distributions as practice targets (April 6, 2011)

The Amnesic Incognito Live System: A live CD for anonymity (April 27, 2011)

Security testing with BackBox 2 (September 8, 2011)

Whonix for anonymity (October 17, 2012)

Distribution security

LCA: How to improve Debian security (January 17, 2007)

Security hardening for Debian (February 6, 2008)

Eee PC security or lack thereof (February 13, 2008)

Debian, OpenSSL, and a lack of cooperation (May 14, 2008)

Debian vulnerability has widespread effects (May 14, 2008)

SELinux and Fedora (July 9, 2008)

Ubuntu, security response, and community contributions (July 16, 2008)

Fedora distributes new keys (September 10, 2008)

Distribution advisories (November 26, 2008)

Fedora and CAPP (December 10, 2008)

OpenVAS replacing Nessus in Debian (August 12, 2009)

Fedora 12 and unprivileged package installation (November 20, 2009)

Fedora's privilege escalation policy proposal (February 3, 2010)

FOSDEM'10: Maemo 6 platform security (February 10, 2010)

Distribution security response times (September 22, 2010)

A high-level view of the MeeGo security landscape (November 17, 2010)

The MeeGo security framework (November 24, 2010)

CentOS 5, RHEL 5.6, and security updates (February 23, 2011)

Arch Linux and (the lack of) package signing (March 23, 2011)

MeeGo rethinks privacy protection (April 13, 2011)

UDS security discussions (May 18, 2011)

Phones and permissions (June 2, 2011)

Security testing tools for Fedora (August 10, 2011)

Six years of RHEL 4 security (August 17, 2011)

Security response: how are we doing? (November 16, 2011)

How long should security embargoes be? (February 8, 2012)

Exploring options for the openSUSE security policy (May 23, 2012)

Fedora and secure release upgrades (December 19, 2012)

Distributions face the MoinMoin and Rails vulnerabilities (January 9, 2013)

Code authenticity checking (May 1, 2013)

Package managers

Trust and mirrors (July 16, 2008)

Attacks on package managers (April 8, 2009)

LSS: Security modules and RPM (October 3, 2012)

Subverting Android package verification (July 10, 2013)

ptrace()

SELinuxDenyPtrace and security by default (April 11, 2012)

Document Object Model (DOM)

Finding bugs lurking in the DOM (January 30, 2008)

Leaking browser history (June 25, 2008)

Domain Name System (DNS)

DNSCurve: an alternative to DNSSEC (July 8, 2009)

TCP cookie transactions (December 16, 2009)

An interesting DNSSEC amplification (July 14, 2010)

SOPA and PIPA (January 18, 2012)

A ".secure" top-level domain (May 16, 2012)

ICANN adds new gTLDs (June 20, 2012)

LSS: DNSSEC (September 19, 2012)

Potential pitfalls in DNS handling (November 14, 2012)

Cache poisoning

Cache poisoning vulnerability found in BIND (July 25, 2007)

Secrecy and the DNS flaw (July 9, 2008)

Details of the DNS flaw revealed (August 13, 2008)

Email

Trustedbird: Additional email security for Thunderbird (February 24, 2010)

Potential pitfalls in DNS handling (November 14, 2012)

Spam prevention

Backscatter increase clogs inboxes (April 9, 2008)

On comment spam (July 28, 2010)

Embedded systems

Threat models for embedded devices (April 14, 2010)

BruCON: How to take over the world by breaking into embedded systems (September 29, 2010)

Default "secrets" (January 5, 2011)

Printer vulnerabilities via firmware update (November 30, 2011)

Exploiting network-enabled digital cameras (April 3, 2013)

Integrity and embedded devices (October 2, 2013)

Encryption

GUADEC: Danny O'Brien on privacy, encryption, and the desktop (August 4, 2010)

Thwarting internet censors with Collage (September 1, 2010)

Tarsnap advisory provides a few lessons (January 19, 2011)

A hole in crypt_blowfish (June 22, 2011)

Martus: Software for human rights groups (October 18, 2011)

IBM's homomorphic encryption library (May 8, 2013)

Disk

"Evil Maid" attack against disk encryption (October 28, 2009)

Attacking full-disk encryption with Inception (January 9, 2013)

DMCA

Another attempt at DMCA reform - sort of (February 28, 2007)

Documents

OpenOffice and document encryption portability (March 28, 2012)

Email

Email privacy (November 7, 2007)

Trustedbird: Additional email security for Thunderbird (February 24, 2010)

STEED: End-to-end email encryption (October 26, 2011)

Filesystems

The Tahoe secure filesystem (April 30, 2008)

Key management

Trusted and encrypted keys (October 6, 2010)

Default "secrets" (January 5, 2011)

On keys and users (June 22, 2011)

SCALE: The Hockeypuck key server (March 13, 2013)

Mobile phone

GSM encryption crack made public (January 6, 2010)

Network

Transport-level encryption with Tcpcrypt (August 25, 2010)

Blocking DPI with Dust (September 5, 2013)

Web

The future of unencrypted web traffic (January 2, 2008)

Deep packet inspection (July 23, 2008)

HTTPS Everywhere brings HTTPS almost everywhere (June 30, 2010)

LFNW: Seth Schoen stumps for SSL (May 4, 2011)

HTTPS interception in Nokia's mobile browser (January 23, 2013)

Subverting HTTPS with BREACH (August 7, 2013)

Web application data

Encrypting users' web data with Grendel (January 27, 2010)

Firefox

Firefox security status (June 7, 2007)

Firefox 3 SSL certificate warnings (August 27, 2008)

Firefox security add-ons (January 21, 2009)

Firefox locks down the components directory (November 24, 2009)

Mozilla's Plugin Check (June 9, 2010)

HTTPS Everywhere brings HTTPS almost everywhere (June 30, 2010)

Free software infrastructure

On the security of our processes and infrastructure (September 8, 2011)

Kernel.org's road to recovery (October 4, 2011)

On keys, trust, and webs (October 5, 2011)

KS2011: Kernel.org report (October 24, 2011)

Safeguarding GNOME.org with an upload lockdown (November 16, 2011)

GCC

GCC and pointer overflows (April 16, 2008)

Glibc

Two glibc vulnerabilities (October 27, 2010)

The ups and downs of strlcpy() (July 18, 2012)

Graphics

Security processes and the X.org flaw (January 25, 2012)

XDC2012: Graphics stack security (September 25, 2012)

Hardening

Security hardening for Debian (February 6, 2008)

LSS: The kernel hardening roundtable (September 15, 2011)

Debian and Suhosin (February 8, 2012)

Shadow hardening (March 21, 2012)

Hardware

Attacking network cards (May 28, 2008)

WebGL vulnerabilities (May 25, 2011)

Trusting the hardware too much (February 15, 2012)

Stealthy network penetration (July 25, 2012)

Attacking full-disk encryption with Inception (January 9, 2013)

Hijacking

X programs

OpenSSH bug falls through the cracks (April 9, 2008)

Home network

The Freedom Box gets off the ground (February 23, 2011)

LinuxCon: FreedomBox update and plans (August 24, 2011)

Can FreedomBox be an alternative to commercial home routers? (July 4, 2012)

Picking a MAC address for a FreedomBox (December 5, 2012)

Identity management

Bandit: multi-protocol identity management (September 26, 2007)

OpenID 2.0 closing in on acceptance (October 31, 2007)

OpenID Connect (June 2, 2010)

The end of OpenID? (February 2, 2011)

BrowserID: A new web authentication scheme (July 27, 2011)

SSSD: System Security Services Daemon (September 27, 2011)

FreeIPA: centralized identity management for Linux (December 11, 2012)

PyCon: Mozilla Persona (March 20, 2013)

Information leak

Our devices are spilling our secrets (August 1, 2007)

Sanitizing kernel memory (May 27, 2009)

Page sanitization, part 2 (June 3, 2009)

Integrity management

Integrity management in the kernel (March 28, 2007)

System integrity in Linux (December 3, 2008)

Integrity management using Intel TXT (April 1, 2009)

Enabling DRM in the kernel? (May 20, 2009)

Enabling Intel TXT in Fedora (April 7, 2010)

The return of EVM (June 30, 2010)

UEFI and "secure boot" (June 15, 2011)

Fedora reexamines "trusted boot" (June 29, 2011)

An update on UEFI secure boot (October 26, 2011)

IMA appraisal extension (March 28, 2012)

LSS: Integrity for directories and special files (September 19, 2012)

Integrity and embedded devices (October 2, 2013)

Internet

SCADA system vulnerabilities (June 11, 2008)

Deep packet inspection (July 23, 2008)

Pogoplug makes internet data sharing easy (December 9, 2009)

TCP cookie transactions (December 16, 2009)

Security in the 20-teens (February 1, 2010)

The Freedom Box gets off the ground (February 23, 2011)

Phantom: Decentralized anonymous networking (June 8, 2011)

Unpredictable sequence numbers (August 17, 2011)

LinuxCon: FreedomBox update and plans (August 24, 2011)

A hole in telnetd (January 4, 2012)

Cyberoam deep packet inspection and certificates (July 11, 2012)

Picking a MAC address for a FreedomBox (December 5, 2012)

Inferring TCP sequence numbers (January 3, 2013)

Censorship

Internet censorship and OONI (May 9, 2012)

Honeypots

Capturing web attacks with open proxy honeypots (July 3, 2007)

Routers

Home routers and security flaws (October 10, 2007)

Linux adds router denial-of-service prevention (March 17, 2010)

Threats

SOPA and PIPA (January 18, 2012)

Cybersecurity and CISPA (May 2, 2012)

Tor

Eavesdropping on Tor traffic (September 12, 2007)

TorProxy and Shadow (October 14, 2009)

Tor offers SSL obfuscation for users behind censorship walls (February 15, 2012)

GUADEC: Imagining Tor built-in to GNOME (August 8, 2012)

DeadDrop and Strongbox (May 22, 2013)

Tor peels back Browser Bundle 3.0 alpha (June 19, 2013)

Tor and browser vulnerabilities (August 7, 2013)

Voice over IP (VoIP)

The Skype outage (August 22, 2007)

"Vishing" advisory targets Asterisk (December 17, 2008)

Book Review: Hacking VoIP (January 28, 2009)

A trojan for Skype (September 2, 2009)

Jails

What chroot() is really for (October 3, 2007)

Javascript

Web security vulnerabilities and Javascript (January 23, 2008)

All the malware that's fit to print (September 16, 2009)

Kernel.org

On the security of our processes and infrastructure (September 8, 2011)

Kernel.org's road to recovery (October 4, 2011)

KS2011: Kernel.org report (October 24, 2011)

Legislation

SOPA and PIPA (January 18, 2012)

Cybersecurity and CISPA (May 2, 2012)

Stockpiling zero-day vulnerabilities (August 15, 2012)

Linux kernel

revoke() returns (December 18, 2007)

vmsplice(): the making of a local root exploit (February 12, 2008)

The rest of the vmsplice() exploit story (March 4, 2008)

Handling kernel security problems (July 16, 2008)

Kernel security, year to date (September 9, 2008)

System calls and rootkits (September 10, 2008)

DR rootkit released under the GPL (September 10, 2008)

The future for grsecurity (January 7, 2009)

Seccomp and sandboxing (May 13, 2009)

Sanitizing kernel memory (May 27, 2009)

Page sanitization, part 2 (June 3, 2009)

Fun with NULL pointers, part 1 (July 20, 2009)

Fun with NULL pointers, part 2 (July 21, 2009)

Null pointers, one month later (August 18, 2009)

/proc and directory permissions (October 28, 2009)

Another null pointer exploit (November 4, 2009)

The x86_64 DOS hole (February 2, 2010)

2.6.32.9 Release notes (February 21, 2010)

Linux adds router denial-of-service prevention (March 17, 2010)

Symbolic links in "sticky" directories (June 2, 2010)

An ancient kernel hole is closed (August 18, 2010)

The hazards of 32/64-bit compatibility (September 22, 2010)

Trusted and encrypted keys (October 6, 2010)

Kernel vulnerabilities: old or new? (October 19, 2010)

Pathname-based hooks for SELinux? (December 8, 2010)

Extending the use of RO and NX (January 12, 2011)

Protecting /proc/slabinfo (March 9, 2011)

Seccomp: replacing security modules? (May 16, 2011)

Kernel address randomization (May 24, 2011)

Seccomp filters: No clear path (July 7, 2011)

Reactive vs. pro-active kernel security (July 13, 2011)

LSS: The kernel hardening roundtable (September 15, 2011)

Loading signed kernel modules (December 7, 2011)

Fixing the symlink race problem (December 14, 2011)

A privilege escalation via SCSI pass-through (January 4, 2012)

Yet another new approach to seccomp (January 11, 2012)

System call filtering and no_new_privs (January 18, 2012)

A /proc/PID/mem vulnerability (January 25, 2012)

Tightening security: not for the impatient (June 27, 2012)

Preparing the kernel for UEFI secure boot (September 6, 2012)

KS2012: Module signing (September 6, 2012)

LSS: Kernel security subsystem reports (September 26, 2012)

Supervisor mode access prevention (September 26, 2012)

The module signing endgame (November 21, 2012)

A rootkit dissected (November 21, 2012)

Filtering SCSI commands (January 30, 2013)

A story of three kernel vulnerabilities (February 19, 2013)

Credentials

Credential records (September 25, 2007)

Linux/POSIX capabilities

LCA: How to improve Debian security (January 17, 2007)

Fixing CAP_SETPCAP (October 31, 2007)

Restricting root with per-process securebits (April 30, 2008)

Filesystem capabilities in Fedora 10 (January 7, 2009)

Another Linux capabilities hole found (April 15, 2009)

Linux capabilities support for user namespaces (December 22, 2010)

Capabilities for loading network modules (March 2, 2011)

CAP_SYS_ADMIN: the new root (March 14, 2012)

Modules

Loading modules from file descriptors (October 10, 2012)

Netfilter

Passive OS fingerprinting added to netfilter (June 10, 2009)

Networking

Unpredictable sequence numbers (August 17, 2011)

Inferring TCP sequence numbers (January 3, 2013)

Random number generation

On entropy and randomness (December 12, 2007)

Linux ASLR vulnerabilities (April 29, 2009)

Random numbers for ASLR (May 13, 2009)

Tools

Trusting the hardware too much (February 15, 2012)

Virtual file system (VFS)

A kernel security hole (January 16, 2008)

Linux malware

Linux malware: an incident and some solutions (December 23, 2009)

Linux Security Modules (LSM)

Linux security non-modules and AppArmor (June 27, 2007)

Smack for simplified access control (August 8, 2007)

SMACK meets the One True Security Module (October 2, 2007)

The future of AppArmor (October 17, 2007)

LSM: loadable or static? (October 24, 2007)

Kernel-based malware scanning (December 4, 2007)

TOMOYO Linux and pathname-based security (April 14, 2008)

OLS: Smack for embedded devices (August 6, 2008)

Snet and the LSM API (January 28, 2009)

Restricting the network (January 6, 2010)

FBAC-LSM (January 13, 2010)

LSM stacking (again) (June 23, 2010)

Pathname-based hooks for SELinux? (December 8, 2010)

Supporting multiple LSMs (February 9, 2011)

MeeGo rethinks privacy protection (April 13, 2011)

Seccomp: replacing security modules? (May 16, 2011)

LSS: LSM roundtable (September 14, 2011)

LSS: Security modules and RPM (October 3, 2012)

Another LSM stacking approach (October 3, 2012)

The return of loadable security modules? (November 28, 2012)

Talking Smack for Tizen security (June 5, 2013)

KPortReserve and the multi-LSM problem (August 14, 2013)

Malware

Infected Linux web servers pushing malware (May 15, 2013)

Mobile phones

Android's first vulnerability (November 5, 2008)

Android application security (February 4, 2009)

What lessons can be learned from the iPhone worms? (November 11, 2009)

GSM encryption crack made public (January 6, 2010)

FOSDEM'10: Maemo 6 platform security (February 10, 2010)

Remotely wiping mobile phones (September 15, 2010)

Questions about Android's security model (October 6, 2010)

Bluepot: A honeypot for Bluetooth attacks (February 16, 2011)

Guardian: Better privacy and security for Android (May 11, 2011)

Phones and permissions (June 2, 2011)

Password storage on Android devices (August 3, 2011)

App confinement for Ubuntu mobile devices (April 24, 2013)

Talking Smack for Tizen security (June 5, 2013)

Tizen content scanning and app obfuscation (June 12, 2013)

Subverting Android package verification (July 10, 2013)

CyanogenMod's incognito mode (July 24, 2013)

CyanogenMod Account: Remotely track or wipe phones (August 21, 2013)

Web browsers

HTTPS interception in Nokia's mobile browser (January 23, 2013)

MoinMoin

Distributions face the MoinMoin and Rails vulnerabilities (January 9, 2013)

MySQL

MySQL flaw leaves some systems wide open (June 13, 2012)

Namespaces

Linux capabilities support for user namespaces (December 22, 2010)

Anatomy of a user namespaces vulnerability (March 20, 2013)

Networking

Unpredictable sequence numbers (August 17, 2011)

Inferring TCP sequence numbers (January 3, 2013)

Filesystems

The Tahoe secure filesystem (April 30, 2008)

Obfuscation

Hiding open ports with shimmer (January 9, 2008)

Wireless

USB device authorization (July 17, 2007)

Network Time Protocol (NTP)

The leap second of doom (August 1, 2012)

One Laptop Per Child (OLPC)

Bitfrost: the OLPC security model (February 7, 2007)

OLPC's software update problem (July 3, 2007)

OpenOffice.org/LibreOffice

BadBunny? Only if you invite it in (June 12, 2007)

An odd vulnerability report for LibreOffice (October 5, 2011)

OpenOffice and document encryption portability (March 28, 2012)

OpenSSH

OpenSSH bug falls through the cracks (April 9, 2008)

OpenSSH and keystroke timings (September 17, 2008)

SSH plaintext recovery vulnerability (November 19, 2008)

Crying wolf over OpenSSH (July 15, 2009)

Distributed brute force ssh attacks (October 21, 2009)

SSH: passwords or keys? (January 13, 2010)

Trust, but verify (February 17, 2010)

What's new in OpenSSH 6.2 (March 27, 2013)

OpenSSL

Debian, OpenSSL, and a lack of cooperation (May 14, 2008)

Debian vulnerability has widespread effects (May 14, 2008)

OpenSSL and IPv6 (March 14, 2012)

Organizations

oCERT and oss-security (June 4, 2008)

Password hashing

A hole in crypt_blowfish (June 22, 2011)

Passwords

Enforcing password strength (October 12, 2011)

A Periodic Table of password managers (November 9, 2011)

Shadow hardening (March 21, 2012)

Responsible disclosure in open source: The crypt() vulnerability (June 6, 2012)

MySQL flaw leaves some systems wide open (June 13, 2012)

Phishing

Redirecting browser tabs via "tabnabbing" (May 26, 2010)

Oxford blocks Google Docs as a phishing countermeasure (March 7, 2013)

PHP

Debian and Suhosin (February 8, 2012)

Tools

Scanning for PHP vulnerabilities with Pixy (June 27, 2007)

Physical security

"Evil Maid" attack against disk encryption (October 28, 2009)

Attacking full-disk encryption with Inception (January 9, 2013)

PostgreSQL

SE-PostgreSQL uses SELinux for database security (July 18, 2007)

Privacy

Our devices are spilling our secrets (August 1, 2007)

Eavesdropping on Tor traffic (September 12, 2007)

Email privacy (November 7, 2007)

Another kind of cookie (October 29, 2008)

GUADEC: Danny O'Brien on privacy, encryption, and the desktop (August 4, 2010)

Thwarting internet censors with Collage (September 1, 2010)

Private browsing: not so private? (September 22, 2010)

Web tracking and "Do Not Track" (January 26, 2011)

Developments in web tracking protection (April 20, 2011)

The Amnesic Incognito Live System: A live CD for anonymity (April 27, 2011)

Phantom: Decentralized anonymous networking (June 8, 2011)

GNUnet adds VPN, direct wireless peering, and more (December 21, 2011)

LCA: Jacob Appelbaum on surveillance and censorship (January 25, 2012)

Tracking users (February 8, 2012)

The perils of desktop tracking (April 18, 2012)

The perils of big data (August 29, 2012)

Do Not Track Does Not Conquer (October 17, 2012)

Privacyfix (October 24, 2012)

Mozilla versus the cookie monster (June 26, 2013)

NSA surveillance and "foreigners" (July 17, 2013)

Python

Reviving Python restricted mode (March 4, 2009)

Race conditions

Exploiting races in system call wrappers (August 15, 2007)

Exploiting symlinks and tmpfiles (September 19, 2007)

Symbolic links in "sticky" directories (June 2, 2010)

Seunshare, /tmp directories, and the "sticky" bit (March 2, 2011)

Fixing the symlink race problem (December 14, 2011)

Random number generation

On entropy and randomness (December 12, 2007)

The dangers of weak random numbers (February 20, 2008)

Debian, OpenSSL, and a lack of cooperation (May 14, 2008)

Debian vulnerability has widespread effects (May 14, 2008)

Linux ASLR vulnerabilities (April 29, 2009)

Random numbers for ASLR (May 13, 2009)

Quantum random numbers (April 25, 2012)

Random numbers for embedded devices (July 17, 2012)

LCE: Don't play dice with random numbers (November 20, 2012)

Sharing random bits with Entropy Broker (April 10, 2013)

Reference

The Application Security Desk Reference (June 18, 2008)

Research

A white paper on comparative browser security (December 14, 2011)

Auctions

Security research: buy low, sell high? (July 11, 2007)

Rootkits

System calls and rootkits (September 10, 2008)

DR rootkit released under the GPL (September 10, 2008)

A rootkit dissected (November 21, 2012)

Ruby

Ruby security flaws expose release process problems (July 2, 2008)

on Rails

GitHub incidents spawns Rails security debate (March 7, 2012)

Distributions face the MoinMoin and Rails vulnerabilities (January 9, 2013)

Samba

Eee PC security or lack thereof (February 13, 2008)

Sandboxes

A library for seccomp filters (April 25, 2012)

Secure boot

UEFI and "secure boot" (June 15, 2011)

Fedora reexamines "trusted boot" (June 29, 2011)

An update on UEFI secure boot (October 26, 2011)

Fedora, secure boot, and an insecure future (June 5, 2012)

Ubuntu details its UEFI secure boot plans (June 27, 2012)

Preparing the kernel for UEFI secure boot (September 6, 2012)

LSS: Secure Boot (September 12, 2012)

Another approach to UEFI secure boot (October 17, 2012)

UEFI secure boot kernel restrictions (November 7, 2012)

The trouble with CAP_SYS_RAWIO (March 13, 2013)

Secure Sockets Layer (SSL)

TLS renegotiation vulnerability (November 18, 2009)

Postfix TLS plaintext injection (March 16, 2011)

Certificates

Extended Validation certificates and cross-site scripting (March 12, 2008)

Firefox 3 SSL certificate warnings (August 27, 2008)

SSL man-in-the-middle attacks (December 24, 2008)

SSL certificates and MD5 collisions (January 14, 2009)

SSL flaws revealed at Black Hat (August 5, 2009)

GUADEC: Danny O'Brien on privacy, encryption, and the desktop (August 4, 2010)

EFF analyzes SSL certificates and certificate authorities (August 11, 2010)

The case of the fraudulent SSL certificates (March 23, 2011)

Fallout from the fraudulent SSL certificates (March 30, 2011)

Certificates and "authorities" (September 7, 2011)

Convergence: User-controlled SSL certificate checking (October 19, 2011)

Sovereign Keys for certificate verification (November 23, 2011)

TACK: TLS key pinning for everyone (May 31, 2012)

Holes discovered in SSL certificate validation (October 31, 2012)

Security Enhanced Linux (SELinux)

SE-PostgreSQL uses SELinux for database security (July 18, 2007)

SELinux and Fedora (July 9, 2008)

OLS: SELinux from academia to your desktop (July 30, 2008)

Newer kernels and older SELinux policies (September 24, 2008)

SELinux permissive domains (October 15, 2008)

MeeGo rethinks privacy protection (April 13, 2011)

SELinuxDenyPtrace and security by default (April 11, 2012)

LSS: Secure Linux containers (September 6, 2012)

SHA-1

Dealing with weakness in SHA-1 (June 17, 2009)

Signing code

Java cryptography and free distributions (March 14, 2007)

Integrity management in the kernel (March 28, 2007)

Enabling DRM in the kernel? (May 20, 2009)

Enabling Intel TXT in Fedora (April 7, 2010)

UEFI and "secure boot" (June 15, 2011)

An update on UEFI secure boot (October 26, 2011)

Loading signed kernel modules (December 7, 2011)

KS2012: Module signing (September 6, 2012)

The module signing endgame (November 21, 2012)

Software updates

Forcing updates (February 11, 2009)

The Firefox extension war (May 6, 2009)

Spam

Backscatter increase clogs inboxes (April 9, 2008)

Storm botnet used to study spam (November 12, 2008)

On comment spam (July 28, 2010)

A decline in email spam? (July 7, 2011)

Surveillance

Security software verifiability (August 21, 2013)

Talpa

Kernel-based malware scanning (December 4, 2007)

The TALPA molehill (August 6, 2008)

TALPA strides forward (August 27, 2008)

TOMOYO Linux

TOMOYO Linux and pathname-based security (April 14, 2008)

Tools

Finding buffer overflows with Parfait (July 29, 2009)

Deliberately insecure Linux distributions as practice targets (April 6, 2011)

Binary "diversity" (August 28, 2013)

Access control

Smack for simplified access control (August 8, 2007)

Attack detection

Forward secure sealing (August 22, 2012)

Browser exploit detection

Finding bugs lurking in the DOM (January 30, 2008)

Firewall

All aboard the SmoothWall Express (August 29, 2007)

Hiding open ports with shimmer (January 9, 2008)

IPFire 2.5: Firewalls and more (April 28, 2010)

Fedora introduces Network Zones (February 29, 2012)

Fuzzing

Fusil: a Python fuzzing library (March 11, 2009)

Intrusion detection

OSSEC for host-based intrusion detection (April 21, 2010)

Network vulnerability scanner

OpenVAS replacing Nessus in Debian (August 12, 2009)

OS detection

Passive OS fingerprinting added to netfilter (June 10, 2009)

Password cracking

John the Ripper (July 18, 2012)

Password guessing prevention

Preventing brute force ssh attacks (October 24, 2007)

Distributed brute force ssh attacks (October 21, 2009)

Penetration testing

Mobile phone or penetration tool? (September 24, 2008)

Security testing with BackBox 2 (September 8, 2011)

Stealthy network penetration (July 25, 2012)

PHP code scanning

Scanning for PHP vulnerabilities with Pixy (June 27, 2007)

Policy management

Centralizing policy rules with PolicyKit (November 14, 2007)

SQL injection scanning

Find SQL injection vulnerabilities with sqlmap (September 3, 2008)

Web application scanning

Web application scanning with skipfish (March 31, 2010)

Tradeoffs

Reactive vs. pro-active kernel security (July 13, 2011)

Blender security vs. usability (July 20, 2011)

Transport Layer Security (TLS)

TLS renegotiation vulnerability (November 18, 2009)

Postfix TLS plaintext injection (March 16, 2011)

Virtualization

LinuxCon: Secure virtualization with sVirt (September 23, 2009)

Qubes: security by virtualization (May 5, 2010)

Virus scanning

DazukoFS: a stackable filesystem for virus scanning (February 11, 2009)

ClamAV 0.96 adds executable virus signatures and more (May 12, 2010)

Voting machines

Securing our votes (August 8, 2007)

Voting machine integrity through transparency (March 26, 2008)

Vulnerabilities

Striking back against web attackers (June 23, 2010)

Authentication bypass

Authentication bypass in routers (March 5, 2008)

Buffer overflow

The ups and downs of strlcpy() (July 18, 2012)

Code execution

A hole in telnetd (January 4, 2012)

Cross-site request forgery (CSRF)

Cross-site request forgery (October 17, 2007)

Cryptographic splicing

Cryptographic splicing makes for a Wordpress vulnerability (May 7, 2008)

Denial of service

Apache attacked by a "slow loris" (June 24, 2009)

Using HTTP POST for denial of service (December 1, 2010)

Denial of service via hash collisions (January 11, 2012)

Format string

Format string vulnerabilities (February 1, 2012)

HTTP range headers

Apache range request denial of service (August 31, 2011)

HTTP response splitting

HTTP response splitting (October 17, 2008)

Image handling

Image handling vulnerabilities (April 23, 2008)

Information leak

Linux ASLR vulnerabilities (April 29, 2009)

Macro language (ab)use

BadBunny? Only if you invite it in (June 12, 2007)

Blender security vs. usability (July 20, 2011)

Privilege escalation

vmsplice(): the making of a local root exploit (February 12, 2008)

The rest of the vmsplice() exploit story (March 4, 2008)

Standards, the kernel, and Postfix (August 20, 2008)

Another Linux capabilities hole found (April 15, 2009)

A privilege escalation flaw in udev (April 22, 2009)

Fun with NULL pointers, part 1 (July 20, 2009)

Fun with NULL pointers, part 2 (July 21, 2009)

Null pointers, one month later (August 18, 2009)

Attacks against WordPress installations (September 9, 2009)

On the importance of return codes (December 2, 2009)

Two glibc vulnerabilities (October 27, 2010)

Calibre and setuid (November 2, 2011)

A /proc/PID/mem vulnerability (January 25, 2012)

Anatomy of a user namespaces vulnerability (March 20, 2013)

Race conditions

Exploiting races in system call wrappers (August 15, 2007)

SQL injection

Find SQL injection vulnerabilities with sqlmap (September 3, 2008)

Temporary files

Exploiting symlinks and tmpfiles (September 19, 2007)

Symbolic links in "sticky" directories (June 2, 2010)

Fixing the symlink race problem (December 14, 2011)

Vulnerabilty hoarding

Stockpiling zero-day vulnerabilities (August 15, 2012)

Web application flaws

The backdooring of WordPress (March 7, 2007)

Home routers and security flaws (October 10, 2007)

Cross-site request forgery (October 17, 2007)

The backdooring of SquirrelMail (December 19, 2007)

Web security vulnerabilities and Javascript (January 23, 2008)

Cryptographic splicing makes for a Wordpress vulnerability (May 7, 2008)

Attacks against WordPress installations (September 9, 2009)

Striking back against web attackers (June 23, 2010)

Web browsers

Leaking browser history (June 25, 2008)

The Firefox extension war (May 6, 2009)

Google's Native Client (June 3, 2009)

Mozilla's Content Security Policy (July 1, 2009)

Google's Chromium sandbox (August 19, 2009)

Firefox extension vulnerabilities (August 26, 2009)

Firefox locks down the components directory (November 24, 2009)

Google Chrome and master passwords (May 19, 2010)

Redirecting browser tabs via "tabnabbing" (May 26, 2010)

Mozilla's Plugin Check (June 9, 2010)

HTTPS Everywhere brings HTTPS almost everywhere (June 30, 2010)

A trojan in a Firefox security add-on (July 21, 2010)

Private browsing: not so private? (September 22, 2010)

Gathering session cookies with Firesheep (November 3, 2010)

Web tracking and "Do Not Track" (January 26, 2011)

Developments in web tracking protection (April 20, 2011)

LFNW: Seth Schoen stumps for SSL (May 4, 2011)

WebGL vulnerabilities (May 25, 2011)

A white paper on comparative browser security (December 14, 2011)

Tracking users (February 8, 2012)

Do Not Track Does Not Conquer (October 17, 2012)

Privacyfix (October 24, 2012)

Security implications for user interface changes? (November 28, 2012)

HTTPS interception in Nokia's mobile browser (January 23, 2013)

LCA: CSP for cross-site scripting protection (February 6, 2013)

Mixed web content (April 17, 2013)

Mozilla PiCL and multi-level security (July 31, 2013)

Tor and browser vulnerabilities (August 7, 2013)

Web frameworks

Denial of service via hash collisions (January 11, 2012)

Web servers

Infected Linux web servers pushing malware (May 15, 2013)

Web sessions

Session cookies for web applications (May 21, 2008)

Should web developers say no to cookie-based authentication? (March 24, 2010)

X client

Pondering the X client vulnerabilities (May 27, 2013)

X server

Security processes and the X.org flaw (January 25, 2012)

XDC2012: Graphics stack security (September 25, 2012)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds