Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 11 Mar 2013 20:51:18 +0000
From: "Christey, Steven M." <coley@...re.org>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>,
	"kseifried@...hat.com" <kseifried@...hat.com>, "DO-webmaster@...t.gov"
	<DO-webmaster@...t.gov>
Subject: RE: *.nist.gov websites gone forever?

I doubt these sites are gone forever.  It's most likely a temporary outage.

Note that web.nvd.nist.gov is at least serving up individual CVEs, such as:

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-5886

- Steve

>-----Original Message-----
>From: Kurt Seifried [mailto:kseifried@...hat.com]
>Sent: Monday, March 11, 2013 1:47 PM
>To: oss-security@...ts.openwall.com; DO-webmaster@...t.gov
>Subject: [oss-security] *.nist.gov websites gone forever?
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>So a bunch of nist.gov websites have been gone now for about 4-5 days:
>
>http://web.nvd.nist.gov
>http://nvd.nist.gov
>http://scap.nist.gov
>
>They are either gone entirely (web.nvd.nist.gov has no server at all),
>or they have a generic "Site/Page Not Available" error now (they were
>serving a CFM error over the weekend).
>
>This impacts CVE a bit since the two main sites are cve.mitre.org and
>the web.nvd.nist.gov one. Any one know what is going on or have a
>contact at nist.gov that can get this sorted out? Are these websites
>gone forever or are they simply having an extended outage?
>
>- --
>Kurt Seifried Red Hat Security Response Team (SRT)
>PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
>-----BEGIN PGP SIGNATURE-----
>Version: GnuPG v1.4.13 (GNU/Linux)
>
>iQIcBAEBAgAGBQJRPhiXAAoJEBYNRVNeJnmTZgkQAJcBuKbU++LPOr1jyOjyQo
>Uo
>Z48pYCxi2TqfmwR9MXGqy0xej27te7cMr3zxRo5/deMACwZfX3BKU176gjuJUO
>Pt
>VdzlnyM7GV0SkI8Ea1Dgriklw4r4UXWrxI8yJvYSwoO5FMjEDysttXDaYhbsXGiq
>tXZSDs8BOQ/6JjfCCBWU9HpI+HMbZb5vm9lCpaS1oq6eyiJ2sGpX4ICZ2XjCNjo5
>vo1wms22iO+2DrnVfdjQ4pbEVSXTDMAdbWF1Pb8SJdhcEhMddHRQSe/Fylo5t
>LgY
>CJoCkWmReYcJ1F5k16mIZ+Mn1Af6K1hY9E+fzQHfxM4IgH6gDrcRa4/bxzLcLkQI
>E7T94Jgz7giEKebA5md3Xwfk8AsmWNgWAXfqWi4bs1YjBvfjlszohN7SRAd2ul7Q
>5CcD8rzGGkxupJBZytATEgF07AVu7yHMuqwPoN7IkSgy9uuI0zW9Bfz5PKnrpJR
>Q
>QMSDJE2QQc2Fimj8Zp++wcrfx9XbX5cWeKFOPTgHKV7mZ/kPgJw1rg5BaXcn/
>M32
>ukOY0ezrfIwSWB2qzUIrKZaMuMLMxToVmUedkE2V5ZjtBUKW2qapDKXpNOR
>BfGSz
>piaxUkXRTcsuTY9Q+YV5k7a41yF4kb2NxRACH1dZkLSENwbOfRyheuQPBWZ02
>Wg+
>hJrRW8IW9YnTmC8Smmt5
>=qSEn
>-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ