SecLists.Org Security Mailing List Archive (original) (raw)

Any hacker will tell you that the latest news and exploits are not found on any web site—not even Insecure.Org. No, the cutting edge in security research is and will continue to be the full disclosure mailing lists such as Bugtraq. Here we provide web archives and RSS feeds (now including message extracts), updated in real-time, for many of our favorite lists. Browse the individual lists below, or search them all using the Site Search box above.

nmap-dev logo

Nmap Development — Unmoderated technical development forum for debating ideas, patches, and suggestions regarding proposed changes to Nmap and related projects. Subscribe to nmap-dev here.

Windows 10/11: Ncat: A message sent on a datagram socket was larger than the internal message buffer ... Ken Kayser (Feb 20)
*Describe the bug*
When listening to a port with ncat, as soon as a UDP packet is received, I
receive a constant stream of errors with the following text: "Ncat: A
message sent on a datagram socket was larger than the internal message
buffer or some other network limit, or the buffer used to receive a
datagram into was smaller than the datagram itself. ."

*To Reproduce*

1. In either a Windows command line or Powershell I enter...

Reverse DNS (issue #3007) Matteo Nicoli (Feb 13)
Hi all,

I noticed a cool feature proposal on GitHub (issue 3007 <https://github.com/nmap/nmap/issues/3007>). It basically
suggests a new feature for returning the (complete) list of DNS records obtained — through reverse DNS lookups — from
an IP address. If it matches with the map product roadmap, I’d like to start implementing it. Is there some maintainer
who could give me a brief feedback about it?

Cheers,
Matteo

Re: Mail stoppage Gordon Fyodor Lyon (Feb 12)
Yes, this was my fault. Mail to the Nmap dev list from non-subscribers
goes through moderation to keep out the spam. I regularly go through the
moderation queue to find and approve the "real" messages, but I was a bit
slow this time. We strongly recommend that folks posting to the list first
subscribe to it. This avoids the moderation delay and prevents them from
missing any responses which might only be sent to the list.

Cheers,...

Mail stoppage Dave Close (Feb 12)
Several messages received today seem to have been stuck on nmap.org for
up to a month. Example (edited for clarity):

Version: 7.94+SVN TypeError: Couldn't find foreign struct converter for 'cairo.Context' Hendrick Halim (Feb 12)
Version: 7.94+SVN
TypeError: Couldn't find foreign struct converter for 'cairo.Context'

topology tab crash Genny and Doug Kent (Feb 12)
zenmap crashes when topology tab clicked.

Output message below

Version: 7.94+SVN
TypeError: Couldn't find foreign struct converter for 'cairo.Context'

Doug Kent

PR #2954, Fix out of bounds reads in packet parsing Domen Puncer Kugler via dev (Feb 12)
Hi,

I've submitted a pull request a few months ago:
https://github.com/nmap/nmap/pull/2954

The PR includes following three commits:
- Fix out of bounds read in HopByHopHeader::validate
- Fix out of bounds read in PacketParser::split
- Add AFL test code for PacketParser

This was found as a part of a short Hackathon at NCC Group.
As far as I can tell, there is no security impact, but it would still be nice
to see this fixed.

Kind regards

High-Priority HTML Parsing script astrotoki via dev (Feb 12)
Hello,

I noticed that under the high priority script ideas was the need for a library that parses HTML info from sites. I
wrote a script that uses a web crawler and extracts html info from attached pages and accompanying urls within the html
body. Let me know if this is what yall were after?

Thanks!
Ryan LaPierre _______________________________________________
Sent through the dev mailing list...

URL Pathfinder astrotoki via dev (Feb 12)
Hello all!

I just wrote up another script, trying to practice and maybe have some added to the master list for nmap. This script
enumerates possible hidden path extensions on urls. As always, Id love input on it, changes or updates.

Thanks all!
Ryan LaPierre _______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at https://seclists.org/nmap-dev/

Null Byte Poisoning NSE astrotoki via dev (Feb 12)
Here is my submission of a script I wrote that should test a site for null byte poisoning vulnerabilities._______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at https://seclists.org/nmap-dev/

First Go astrotoki via dev (Feb 12)
Hello!,

I just started learning Lua for writing NSEs and had a go at a HTTP crawler that identifies XSS vulnerabilities on
sites. I used Juice-Shop OWASP to confirm it works. (Thats why the source code uses port 3000 in addition to 80) Id
love feedback! Doing my best to learn as much as I can. I attached the http_xss_crawler.nse below!

PS. I had used ChatGPTo1 and Github CoPilot to aid in debugging and syntax issues. The overall code is my...

High-Priority HTML Parsing script astrotoki via dev (Jan 28)
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at https://seclists.org/nmap-dev/

nmap-announce logo

Nmap Announce — Moderated list for the most important new releases and announcements regarding the Nmap Security Scanner and related projects. We recommend that all Nmap users subscribe to stay informed.

Nmap 7.95 released: OS and service detection signatures galore! Gordon Fyodor Lyon (May 05)
Dear Nmap Community,

I just arrived in San Francisco for the RSA conference and am delighted to
announce our Nmap Version 7.95 release! I'm most excited that we finally
tackled our backlog of OS and service detection fingerprint submissions.
We're not talking about dozens or hundreds of them-we processed more than
6,500 fingerprints!

For OS detection, we added 336 signatures, bringing the new total to 6,036.
Additions include iOS 15...

Npcap Celebrates its 10th Anniversary In Space! Gordon Fyodor Lyon (Oct 05)
Dear Nmap community,

Last month we celebrated Nmap's 26th birthday and today I'm happy to share
another big milestone: Our Npcap driver for capturing and sending raw
packets on Windows turned 10 this year! From humble beginnings as a
security and modernization patch for the discontinued WinPcap project,
Npcap has become an indispensable component for both Nmap and Wireshark.
And it's used by hundreds of other software products and...

Nmap 26th Birthday Announcement: Version 7.94 Gordon Fyodor Lyon (Sep 01)
Dear Nmap community,

Today is Nmap’s 26th birthday, which reminded me that I hadn’t yet
announced our Nmap 7.94 release from May. And it’s a great one! The biggest
improvement was the Zenmap and Ndiff upgrades from the obsolete Python 2
language to Python 3 on all platforms. Big thanks to Daniel Miller, Jakub
Kulík, Brian Quigley, Sam James, Eli Schwartz, Romain Leonard, Varunram
Ganesh, Pavel Zhukov, Carey Balboa, and Hasan Aliyev for...

fulldisclosure logo

Full Disclosure — A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue.

83 vulnerabilities in Vasion Print / PrinterLogic Pierre Kim (Apr 13)
No message preview for long message of 656780 bytes.

Re: APPLE-SA-03-11-2025-2 iOS 18.3.2 and iPadOS 18.3.2 Nick Boyce (Apr 13)
[Complete Apple product novice here (my devices all run a non-Apple
OS), but I'm asking for a friend]

Could someone please clarify the following part of the advisory for me:

Does this mean the update will be available via the "Software Update"
feature on an iPhone - or not ?

The quoted paragraph of Apple's advisory is a bit
Schroedinger's-Cat-ish - the update is both available and not
available.

Thanks,

Nick

[...]...

APPLE-SA-04-01-2025-1 watchOS 11.4 Apple Product Security via Fulldisclosure (Apr 02)
APPLE-SA-04-01-2025-1 watchOS 11.4

watchOS 11.4 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122376.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AirDrop
Available for: Apple Watch Series 6 and later
Impact: An app may be able to read arbitrary file metadata
Description: A...

APPLE-SA-03-31-2025-11 visionOS 2.4 Apple Product Security via Fulldisclosure (Apr 02)
APPLE-SA-03-31-2025-11 visionOS 2.4

visionOS 2.4 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122378.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Accounts
Available for: Apple Vision Pro
Impact: Sensitive keychain data may be accessible from an iOS backup
Description: This issue...

APPLE-SA-03-31-2025-10 tvOS 18.4 Apple Product Security via Fulldisclosure (Apr 02)
APPLE-SA-03-31-2025-10 tvOS 18.4

tvOS 18.4 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122377.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AirDrop
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to read arbitrary file metadata
Description: A...

APPLE-SA-03-31-2025-9 macOS Ventura 13.7.5 Apple Product Security via Fulldisclosure (Apr 02)
APPLE-SA-03-31-2025-9 macOS Ventura 13.7.5

macOS Ventura 13.7.5 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122375.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AccountPolicy
Available for: macOS Ventura
Impact: A malicious app may be able to gain root privileges
Description:...

APPLE-SA-03-31-2025-8 macOS Sonoma 14.7.5 Apple Product Security via Fulldisclosure (Apr 02)
APPLE-SA-03-31-2025-8 macOS Sonoma 14.7.5

macOS Sonoma 14.7.5 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122374.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

AccountPolicy
Available for: macOS Sonoma
Impact: A malicious app may be able to gain root privileges
Description: This...

APPLE-SA-03-31-2025-7 macOS Sequoia 15.4 Apple Product Security via Fulldisclosure (Apr 02)
APPLE-SA-03-31-2025-7 macOS Sequoia 15.4

macOS Sequoia 15.4 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122373.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Accessibility
Available for: macOS Sequoia
Impact: An app may be able to access sensitive user data
Description: A logging...

APPLE-SA-03-31-2025-4 iPadOS 17.7.6 Apple Product Security via Fulldisclosure (Apr 02)
APPLE-SA-03-31-2025-4 iPadOS 17.7.6

iPadOS 17.7.6 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122372.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Accounts
Available for: iPad Pro 12.9-inch 2nd generation, iPad Pro 10.5-inch,
and iPad 6th generation
Impact: Sensitive keychain...

basics logo

Security Basics — A high-volume list which permits people to ask "stupid questions" without being derided as "n00bs". I recommend this list to network security newbies, but be sure to read Bugtraq and other lists as well.

webappsec logo

Web App Security — Provides insights on the unique challenges which make web applications notoriously hard to secure, as well as attack methods including SQL injection, cross-site scripting (XSS), cross-site request forgery, and more.

dailydave logo

Daily Dave — This technical discussion list covers vulnerability research, exploit development, and security events/gossip. It was started by ImmunitySec founder Dave Aitel and many security luminaries participate. Many posts simply advertise Immunity products, but you can't really fault Dave for being self-promotional on a list named DailyDave.

OpenAI Security Research Dave Aitel via Dailydave (Mar 28)
So a few things:
1. https://openai.com/index/security-on-the-path-to-agi/ I feel like this
blog is worth reading. :)
2. We're throwing a post-RSAC conference in SanFran to talk about AI and
Security (in particular, securing cybery things with AI) and if I'm very
lucky I'll even get to do a quick demo of the software I've been working
on, not that it will surprise anyone on this list! We have a few tickets
left I think and if...

Re: Cyber Reasoning Systems A K via Dailydave (Mar 28)
Have you already reviewed https://github.com/open-crs ?

Cyber Reasoning Systems Dave Aitel via Dailydave (Mar 04)
I continue to believe there are a lot of interesting questions around
building cyber reasoning systems for vuln finding. Even the very basics
seem hard to study and understand, and the eval datasets available
are....sparse or incomplete. For example, what you really want if you're
analyzing git repos is the commit a bug was introduced, and the commit it
was fixed. But usually you get "a commit where it maybe existed".

Likewise,...

on your child going to college in Christchurch, NZ and velvet worms Dave Aitel via Dailydave (Feb 11)
*on your child going to college in Christchurch, NZ and velvet worms*

By mid‑August the garden already practices absence — stems turning hollow,
the robin leaving its notes hanging in the air like torn corners of a song.
Under the chirp of palmetto bugs, a log eases itself back into earth.
Inside, hidden from the light, a velvet worm does the impossible: offers
herself to a spill of pale, blind threads. For days she is nothing but
hunger...

Re: (the root of the root and the bud of the bud) Sean Heelan via Dailydave (Jan 13)
As it happens, I’ve found the most effective way to use LLMs is to de-anthropomorphise them entirely and treat them
very like fuzzers (large scale generation of results, lots of false positives/nonsense, filtered by some oracle).

The “conversation with an AI” approach where you imagine yourself as having a single artificial brain to interact with
is (currently at least) practically far less useful than one in which you are content with...

Re: (the root of the root and the bud of the bud) Don A. Bailey via Dailydave (Jan 12)
I designed one of the first working fuzzers (albeit unintentionally) back
in the late 90's. I don't remember if I published it, but I still have the
code. It, however, worked - badly - but it worked. I was heavily flamed,
however, because as you stated - it was not hip. It only attacked
environment variable and command-line argument based vulnerabilities. But,
in the 90's and early 00's, we had no shortage of local suid-based...

Re: (the root of the root and the bud of the bud) Thomas Dullien via Dailydave (Jan 12)
Hey,

I have one quibble: We are using "reasoning" in a qualitative, not
descriptive, form here -- "fuzzing is or is not reasoning", "LLMs reason or
do not reason". I am not sure this is helpful. Fuzzing is empirically
successful at finding crashes. Somebody that needs to light a fire and
smashes two stones together until they throw sparks does not, once the fire
burns, need to justify that 'stones perform...

Re: (the root of the root and the bud of the bud) Darren Bounds via Dailydave (Jan 12)
Everything old is new and the way we reason is the same way LLMs reason. It's
not about looking for the same problem the same way it's about going to
searching for that flaw the same way with unlimited (nearly) resources.

Traditional human-led vulnerability research and discovery is, today, a short
lived venture.

Things will change very rapidly over the coming 24 months.

Memories and thoughts are the same thing, someone tried to...

(the root of the root and the bud of the bud) Dave Aitel via Dailydave (Jan 11)
Memories and thoughts are the same thing, someone tried to explain to me
recently. You have to think to remember, in other words. This is hard to
grasp for a lot of people because they *think *they have *memories*. They
wrongly think memory is a noun instead of a verb, which is ok in philosophy
and psychology but in cutting edge computer science we have to be precise
about these sorts of things.

Twenty-five years ago, when I first started...

the endless stream Dave Aitel via Dailydave (Dec 31)
I've seen great people in our industry crushed under the weight of the
secrets they carry into a singularity from which no information can emerge.
In some ways the lesson from apache_nosejob.c
<https://www.exploit-db.com/exploits/21560> was that we cannot take
ourselves seriously, that at the heart of our discipline there must remain
a jester, that we must float upon the stream of endless information rather
than absorb it into our...

Hacking the Edges of Knowledge: LLMs, Vulnerabilities, and the Quest for Understanding Dave Aitel via Dailydave (Nov 02)
[image: image.png]

It's impossible not to notice that we live in an age of technological
wonders, stretching back to the primitive hominids who dared to ask "Why?"
but also continually accelerating and pulling everything apart while it
does, in the exact same manner as the Universe at large. It is why all the
hackers you know are invested so heavily in Deep Learning right now, as if
someone got on a megaphone at Chaos...

Grace Hopper and the Rebirth of US Conferences Dave Aitel via Dailydave (Oct 10)
I spent some time watching all the Grace Hopper videos on the youtubes, as
I prepared for what up North is a horrible storm, but here in Miami is, so
far, a breezy and clear day. You can hear her talk about how subroutines
used to be literal handwritten pages of instructions in notebooks. When you
wanted SIN or COS you would go over to whoever had the notebook with the
working version, and copy it out into your code.

It was this experience that...

funsec logo

Funsec — While most security lists ban off-topic discussion, Funsec is a haven for free community discussion and enjoyment of the lighter, more humorous side of the security community

cert logo

CERT Advisories — The Computer Emergency Response Team has been responding to security incidents and sharing vulnerability information since the Morris Worm hit in 1986. This archive combines their technical security alerts, tips, and current activity lists.

CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management CISA (Mar 21)
Cybersecurity and Infrastructure Security Agency (CISA) - Defend Today, Secure Tomorrow

You are subscribed to Cybersecurity Advisories for Cybersecurity and Infrastructure Security Agency. This information
has recently been updated, and is now available.

CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management [...

oss-sec logo

Open Source Security — Discussion of security flaws, concepts, and practices in the Open Source community

Re: CVE-2025-32433: Unauthenticated Remote Code Execution in Erlang/OTP SSH Fabian Bäumer (Apr 19)
Hi Alexander,

We used a technique called state machine learning to infer the state
machine of the Erlang/OTP SSH server by interaction. With the state
machine at hand, we noticed unexpected state transitions during the
handshake caused by SSH_MSG_CHANNEL_OPEN messages. In particular,
sending SSH_MSG_CHANNEL_REQUEST without SSH_MSG_CHANNEL_OPEN caused the
connection to terminate, while sending SSH_MSG_CHANNEL_OPEN first
changed this...

CVE-2025-29953: Apache ActiveMQ NMS OpenWire Client: deserialization allowlist bypass Arnout Engelen (Apr 18)
Severity: moderate

Affected versions:

- Apache ActiveMQ NMS OpenWire Client before 2.1.1

Description:

Deserialization of Untrusted Data vulnerability in Apache ActiveMQ NMS OpenWire Client.

This issue affects Apache ActiveMQ NMS OpenWire Client before 2.1.1 when performing connections to untrusted servers.
Such servers could abuse the unbounded deserialization in the client to provide malicious responses that may eventually
cause arbitrary...

Re: CVE-2025-32433: Unauthenticated Remote Code Execution in Erlang/OTP SSH Fabian Bäumer (Apr 18)
Hi all,

I would like to follow up on my last post with a few more details, now
that people had a chance to act and public PoCs for CVE-2025-32433 are
available.

### Details

Let me start with a brief introduction to the SSH protocol. The SSH
protocol is not one protocol but three: the transport layer protocol
(RFC4253), the authentication protocol (RFC4252), and the connection
protocol (RFC4254). The transport layer protocol handles most...

Re: Multiple vulnerabilities in libxml2 Nick Wellnhofer (Apr 17)
I haven't looked at the details, but I assume that out-of-bounds writes are possible as well.

Right, it's probably just an OOB read. The title was copied from the original report.

Nick

Re: Multiple vulnerabilities in libxml2 Solar Designer (Apr 17)
Hi,

Thank you Nick for reporting these in here!

The titles above say "buffer overflow", but information over the
provided links suggests that both are actually out-of-bounds reads.
Is this correct?

"we return `lenread` even if it was larger than `len`! This is probably
what causes callers to read past the end of the buffer, triggering
memory errors reported by Valgrind"

"This issue occurs when processing crafted xml...

Multiple vulnerabilities in libxml2 Nick Wellnhofer (Apr 17)
These issues are fixed in 2.14.2 and 2.13.8. Older branches won't receive official updates.

[CVE-2025-32414] Buffer overflow when parsing text streams with Python API
https://gitlab.gnome.org/GNOME/libxml2/-/issues/889

The Python Package Index contains an outdated and unsanctioned upload based on libxml2 2.9.5 which is vulnerable. I
tried to inform the PyPI maintainers but I'm not sure my message made it through.

[CVE-2025-32415]...

Re: CVE program averts swift end Jan Klopper (Apr 17)
That is a bit of a short-sighted response.

We cannot query your brain for information, and thinking that you can
actively avoid any issues by updating to the newest version is not only
a fantastic dream, its also a potential route to getting compromised, as
not every new version of every bit of software is safe, or solves all
known problems.

Having a query-able and well maintained list of known issues helps in
cases where you know what...

Re: CVE program averts swift end Olle E. Johansson (Apr 17)
I think that we have to work towards a federated distributed global system, not relying on a single state or company.
I’ve been working on gathering thoughts on it for a while, starting years ago when I realised that the NVD was poorly
funded and only 25 persons. This will take time, but we have to start immediately. I believe the technical aspects will
be solved, but we have to focus on building a working organisation for it.

The current...

Re: CVE program averts swift end Alan Coopersmith (Apr 16)
https://www.thecvefoundation.org/ appears to be doing so, but doesn't have
details ready to share just yet. https://euvd.enisa.europa.eu/ may be another
option, especially for EU folks.

Re: CVE program averts swift end Brian Behlendorf (Apr 16)
Dodged a bullet for now, it seems, but it'll be a long time before USG
sustainance funding for something this obvious can be taken for granted.
At this point might USG funding even be unreliable enough to account for
as a receivable on a balance sheet even in the presence of a signed
contract and for work performed.

For critical infrastructure that requires sustained funding, it seems more
important than ever to move to RAID - a...

Re: CVE program averts swift end Marco Moock (Apr 16)
Am 16.04.2025 um 16:57:20 Uhr schrieb Rolf Reintjes:

I don't see a real use-case for such databases - especially if they
consume that much money. I subscribe to the security mailing lists or
newsgroups for the operating systems and software I use and install new
versions immediately - if possible automated.

nanog logo

NANOG — The North American Network Operators' Group discusses fundamental Internet infrastructure issues such as routing, IP address allocation, and containing malicious activity.

[NANOG] OAM and multiple choice questions David Zimmerman via NANOG (Apr 18)
Hi, all. A few months ago, I got really good guidance here to pursue OAM instead of trying to use BFD in unnatural
ways. I've been reaching out to my vendors and through various searches, since the OAM space is wholly foreign to me,
and I'm currently on four different paths:

* IEEE 802.1ag<https://www.ieee802.org/1/pages/802.1ag.html> now part of IEEE 802.1Q-2022 CFM
* IEEE 802.3ah<...

[NANOG] Re: CGNAT growing pains Jon Lewis via NANOG (Apr 17)
More like 10% here.

Juniper does support overflow, but IIRC, in a later release than we're
currently running, and the overflow requires a separate dedicated overflow
pool. We already had to move from a single pool to seven to solve the IP
Geo problem "one big pool" had caused. Configuring overflow pools without
breaking IP Geo [again] would mean doubling the number of pools (one
overflow pool for each regional pool). While...

[NANOG] Re: CGNAT growing pains Jon Lewis via NANOG (Apr 17)
I was just googling something related, hit this thread, and realized I'd
neglected to reply to some of the messages I should have responded to :)

The network is "fully" dual-stack. There are a couple of pockets of
legacy gear that didn't get dual-stacked when the rest of the network
was done years ago, and we're not subjecting those pockets to CGNAT. Our
policy has been, "if v4 is all you have, you keep your...

[NANOG] Join the NANOG Discord Channel! + More Nanog News via NANOG (Apr 17)
*** Keep the Conversations Going on the NANOG Discord Channel!*
------------------------------------------------------------
*Have you Joined the NANOG Discord yet?*

Keep the conversations going between the in-person meetups, where you will
find groups of channels related to the conferences, NANOG committees,
technology, and official + unofficial affinity groups.

*SEE MORE* <https://discord.nanog.org.> (http:// https://discord.nanog.org.)...

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy Tom Beecher via NANOG (Apr 16)
Strange, I do that on my home network and it works just fine.

It's not a CDN's responsibility :
A : To help a country enforce a law that was written without considering
the technical ways in which it could be enforced
B : To help if an improper technical solution is chosen that impacts other
services as well

[NANOG] NANOG Mail List Alias ending 18-April-2025 Valerie Wittkop via NANOG (Apr 15)
NANOG Community,

It has been a month and a half since we completed maintenance on our
instance of Mailman, and started using nanog () lists nanog org.

This message is to notify you we will be ending the use of the
nanog () nanog org alias on Friday, 18 April before noon eastern. Once the
alias is turned off, messages addressed to nanog () nanog org will NOT be
delivered to the NANOG mail list. If you send a message to nanog () nanog org
you...

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy Hank Nussbacher via NANOG (Apr 15)
Italy:
https://arstechnica.com/gadgets/2025/03/italian-court-orders-google-to-block-iptv-pirate-sites-at-dns-level/
Extract:
Just last year, Italian ISPs briefly blocked the entire Google Drive
domain because someone, somewhere used it to share copyrighted material.
This is often called DNS poisoning or spoofing in the context of online
attacks, and the outcome is the same if it's being done under legal
authority: a DNS record is altered...

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy nanog--- via NANOG (Apr 15)
You control the endpoints of the communication, so you may install
uBlock Origin in your browser.

Unless your browser happens to run on an iPhone, in which case - you had
free choice to buy a phone that supported ad-blocking or one where you
were prevented from ad-blocking, so you have nobody to blame for that
choice but yourself.

Unless you live in one of those weird social circles where the text
bubbles have to be blue or you get...

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy nanog--- via NANOG (Apr 15)
Why is it not also 100% that government's fault for wilfully and
intentionally making impossible blocking orders?

And why stop at ECH? Why not 100% blame Github's if China blocks Github,
for using TLS? You're running defense for totalitarianism here - not a
good look.

Yes, to help prevent totalitarian censorship, networks have been
designed to prevent anyone other than the endpoints of a communication
from learning what is...

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy Brian Turnbow via NANOG (Apr 15)
Il giorno lun 14 apr 2025 alle ore 17:20 Raúl Martínez via NANOG
<nanog () lists nanog org> ha scritto:

At least this was court ordered.
Here in Italy the Serie A league donated a software platform to AGCOM
( Telecommunication ministry) and congress passed a law obligating
providers to block IPs and domains within 30 minutes of publication
using the platform. The kicker is that the copyright holders
themselves are the ones to insert the...

[NANOG] Re: Small Capacity UPS Mark Tinka via NANOG (Apr 14)
Not for me, no.

30°C is where I will peak out for a charging event to 100% SoC, and then
let the cells settle at 25°C - 28°C after that.

Mark.

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy Gary Sparkes via NANOG (Apr 14)
They're not the good guy in terms of being a centralized service, perhaps, but the technology they've introduced and
are pushing is technology I happily and enthusiastically deploy myself on my own services, though since I'm not going
through their CDN you can still easily block/restrict my services.

That, I think, is an important part to remember - the only fault cloudflare has here is being used by many services,
the...

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy Constantine A. Murenin via NANOG (Apr 14)
Not quite, because the entire Wikipedia in all languages is then
simply blocked, so, they're not even able to read any of the other
articles from Wikipedia either, in any language. This violates primal
protocol design principles of flexibility and resilience, business
continuity and backwards compatibility.

Also, the same principle that prevents Spain from selectively blocking
a single Cloudflare site, also prevents me, as a network...

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy Gary Sparkes via NANOG (Apr 14)
Which is good. They're doing the right thing in general.

-----Original Message-----
From: Constantine A. Murenin via NANOG <nanog () lists nanog org>
Sent: Monday, April 14, 2025 9:22 PM
To: Tim Burke <tim () mid net>
Cc: nanog () lists nanog org; Constantine A. Murenin <mureninc () gmail com>
Subject: [NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy

You cannot expect the entire world to have...

[NANOG] Re: ISPs in Spain are blocking CDN IP ranges to tackle soccer piracy Constantine A. Murenin via NANOG (Apr 14)
You cannot expect the entire world to have the same laws as the United States.

If laws of foreign countries specify that some content that's legal in
the US has to be blocked in said country, it's 100% Cloudflare's fault
for wilfully and intentionally making such blocking impossible apart
from blocking Cloudflare's entire network, affecting all the other
customers, too.

You can't have your cake and eat it, too. A...

risks logo

The RISKS Forum — Peter G. Neumann moderates this regular digest of current events which demonstrate risks to the public in computers and related systems. Security risks are often discussed.

Risks Digest 34.61 RISKS List Owner (Apr 18)
RISKS-LIST: Risks-Forum Digest Friday 18 April 2025 Volume 34 : Issue 61

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/34.61>
The current issue can also be found at
<...

Risks Digest 34.60 RISKS List Owner (Apr 01)
RISKS-LIST: Risks-Forum Digest Tuesday 1 April 2025 Volume 34 : Issue 60

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/34.60>
The current issue can also be found at
<...

Risks Digest 34.58 RISKS List Owner (Mar 15)
RISKS-LIST: Risks-Forum Digest Saturday 15 Mar 2025 Volume 34 : Issue 58

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/34.58>
The current issue can also be found at
<...

Risks Digest 34.56 RISKS List Owner (Feb 16)
RISKS-LIST: Risks-Forum Digest Sunday 16 Feb 2025 Volume 34 : Issue 56

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/34.56>
The current issue can also be found at
<...

Risks Digest 34.54 RISKS List Owner (Feb 06)
RISKS-LIST: Risks-Forum Digest Thursday 6 Jan 2025 Volume 34 : Issue 54

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/34.54>
The current issue can also be found at
<...

Risks Digest 34.53 RISKS List Owner (Jan 26)
RISKS-LIST: Risks-Forum Digest Sunday 26 Jan 2025 Volume 34 : Issue 53

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/34.53>
The current issue can also be found at
<...

(no subject) RISKS List Owner (Jan 11)
Risks Digest 34.52

RISKS-LIST: Risks-Forum Digest Saturday 11 January 2025 Volume 34 : Issue 52

ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks)
Peter G. Neumann, founder and still moderator

***** See last item for further information, disclaimers, caveats, etc. *****
This issue is archived at <http://www.risks.org> as
<http://catless.ncl.ac.uk/Risks/34.52>
The current issue can also be found at...

dataloss logo

BreachExchange — BreachExchange focuses on all things data breach. Topics include actual data breaches, cyber insurance, risk management, metrics and more. This archive includes its predecessor, the Data Loss news and discussion lists.

wireshark logo

Wireshark — Discussion of the free and open source Wireshark network sniffer. No other sniffer (commercial or otherwise) comes close. This archive combines the Wireshark announcement, users, and developers mailing lists.

snort logo

Snort — Everyone's favorite open source IDS, Snort. This archive combines the snort-announce, snort-devel, snort-users, and snort-sigs lists.

Snort Subscriber Rules Update 2025-04-18 Research via Snort-sigs (Apr 18)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the and server-other
rule sets to provide coverage for emerging threats from these
technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-04-17 Research via Snort-sigs (Apr 17)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the exploit-kit,
file-pdf, malware-other, os-windows and server-webapp rule sets to
provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-04-15 Research via Snort-sigs (Apr 15)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-chrome,
file-other, malware-other, policy-other and server-webapp rule sets to
provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-04-10 Research via Snort-sigs (Apr 10)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the os-windows and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-04-08 Research via Snort-sigs (Apr 08)
Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2025-21247:
A coding deficiency exists in Microsoft MapUrlToZone that may lead to
security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64652 through 64653,
Snort 3: GID 1, SID...

Snort Subscriber Rules Update 2025-04-03 Research via Snort-sigs (Apr 03)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the file-flash and
malware-other rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-04-01 Research via Snort-sigs (Apr 01)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the malware-cnc,
malware-other, os-other, policy-other, protocol-other, server-apache
and server-webapp rule sets to provide coverage for emerging threats
from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-03-27 Research via Snort-sigs (Mar 27)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the and server-webapp
rule sets to provide coverage for emerging threats from these
technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-03-27 Research via Snort-sigs (Mar 27)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-plugins,
file-java, indicator-obfuscation, malware-other and server-webapp rule
sets to provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-03-25 Research via Snort-sigs (Mar 25)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the file-flash,
malware-cnc, malware-other, os-windows, policy-other, server-apache,
server-mail and server-webapp rule sets to provide coverage for
emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-03-20 Research via Snort-sigs (Mar 20)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-plugins,
file-other and server-webapp rule sets to provide coverage for emerging
threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-03-18 Research via Snort-sigs (Mar 18)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-chrome,
browser-firefox, file-multimedia, file-other, malware-cnc and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-03-13 Research via Snort-sigs (Mar 13)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the file-image,
malware-cnc and server-webapp rule sets to provide coverage for
emerging threats from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

Snort Subscriber Rules Update 2025-03-11 Research via Snort-sigs (Mar 11)
Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2025-21247:
A coding deficiency exists in Microsoft MapUrlToZone that may lead to
security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64652 through 64653,
Snort 3: GID 1, SID...

Snort Subscriber Rules Update 2025-03-06 Research via Snort-sigs (Mar 06)
Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos has added and modified multiple rules in the browser-chrome,
deleted, file-image, file-other, policy-spam, server-apache and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories

We also maintain archives for these lists (some are currently inactive):

Read some old-school private security digests such as Zardoz at SecurityDigest.Org

We're always looking for great network security related lists to archive. To suggest one, mail Fyodor.