Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

   


   


   















      :: Inet-Admins
Inet-Admins mailing list archive (inet-admins@info.east.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[inet-admins] Fw: Cisco IOS software security notice



  bugtraq,     ... 
-----Original Message-----
From: security-alert@cisco.com <security-alert@cisco.com>
To: BUGTRAQ@netspace.org <BUGTRAQ@netspace.org>
Date: 13  1998 . 0:43
Subject: Cisco IOS software security notice


>-----BEGIN PGP SIGNED MESSAGE-----
>
>Field Notice:
>Cisco IOS Remote Router Crash
>=============================
>Revision 1.2
>For release 08:00 AM US/Pacific, Wednesday, August 12, 1998
>Cisco internal use only until release date
>
>Summary
>=======
>An error in Cisco IOS software makes it possible for untrusted,
>unauthenticated users who can gain access to the login prompt of a router or
>other Cisco IOS device, via any means, to cause that device to crash and
>reload.
>
>This applies only to devices running classic Cisco IOS software. This
>includes most Cisco routers with model numbers greater than or equal to
>1000, but does not include the 7xx series, the Catalyst LAN switches, WAN
>switching products in the IGX or BPX lines, the AXIS shelf, early models of
>the LS1010 or LS2020 ATM switches, or any host-based software.
>
>Who Is Affected
>===============
>All users of classic Cisco IOS software versions 9.1 and later, but earlier
>than the repaired versions listed in the "Details" section of this notice,
>whose devices can be connected to interactively by untrusted users, are
>affected by this vulnerability. It is not necessary to be able to actually
>log in to exploit this vulnerability; simply establishing a terminal
>connection is sufficient.
>
>Note that some of the repaired software has been in the field for some time;
>you may already have installed it. Please check your software version number
>before assuming that you are affected.
>
>The vulnerability can be exploited using direct console or asynchronous
>serial connections (including dialup connections), TELNET connections, UNIX
>"r" command connections, LAT connections, MOP connections, X.29 connections,
>V.120 connections, and possibly others. Except in extraordinary security
>environments, administrators are strongly encouraged to assume that hostile
>users can find ways to make interactive connections to their Cisco IOS
>devices.
>
>If you are not running classic Cisco IOS software, then you are not affected
>by this vulnerability. If you are unsure whether your device is running
>classic Cisco IOS software, log into the device and issue the command show
>version. Classic Cisco IOS software will identify itself simply as "IOS" or
>"Internetwork Operating System Software", and affected software will have a
>version number greater than or equal to 9.1. Other Cisco devices either will
>not have the show version command, or will give different output.
>
>Impact
>======
>If attackers know the details of the Cisco IOS software error they will be
>able to cause the router to crash and reload without having to log in to the
>router. Because this problem involves damage to an internal data struture,
>it is possible that other, more subtle or targeted effects on system
>operation could also be induced by proper exploitation. Such exploitation,
>if it is possible at all, would require significant engineering skill and a
>thorough knowledge of the internal operation of Cisco IOS software,
>including Cisco trade secret information.
>
>Details
>=======
>The Cisco IOS software error has been assigned Cisco bug ID CSCdj43337.
>
>Affected and Repaired Software Versions
>- -------------------------------------
>This vulnerability affects all releases of Classic Cisco IOS software from
>9.1 up to, but not including, the following corrected releases (including
>interim and beta software):
>
>
>   * 11.3(1),  11.3(1)ED, 11.3(1)T
>   * 11.2(10), 11.2(9)P, 11.2(9)XA, 11.2(10)BC
>   * 11.1(15)CA, 11.1(16), 11.1(16)IA, 11.1(16)AA, 11.1(17)CC, 11.1(17)CT
>   * 11.0(20.3)
>
>Releases of Cisco IOS software up to and including 10.3 have reached end of
>support, and no fixes are currently or planned to be available for those
>releases. All releases after 9.1 do, however, contain the problem.
>
>All planned fixes to Cisco IOS software have been completed and tested.
>Integration into regular released software is complete for all versions
>except 11.0. If you are running a version of software earlier than the ones
>listed above, please contact the Cisco TAC for assistance.
>
>As of the date of this notice, the fix for this problem is available for the
>11.0 release only in the 11.0(20.3) version. This  is an interim release,
>and has not been subjected to the same degree of testing as a regular
>IOS release. The first regular 11.0 release containing the fix will be
>11.0(21). Release of 11.0(21) is tentatively scheduled for mid-September,
>1998; this schedule is subject to change. Because of the relative maturity
>of the 11.0 Cisco IOS software, Cisco believes that installation of
>11.0(20.3) carries less risk than would installation of an interim release
>for a newer Cisco IOS version, but customers are advised to use caution in
>installing 11.0(20.3), or any other interim release, in any critical device.
>
>Cisco is offering free software upgrades to all vulnerable customers,
>regardless of contract status. Customers with service contracts may upgrade
>to any Cisco IOS software version. Customers without contracts may upgrade
>to the latest versions of the images that they are already running (for
>example, from 11.2(2) to 11.2(11), but not from 11.2(2) to 11.3(3)).
>Customers without contracts who are running 10.3 or older software will
>receive free upgrades to fixed 11.0 versions, but should be careful to make
>sure that their hardware can support the new software before upgrading.
>
>Customers with contracts should obtain upgraded software through their
>regular update channels (generally via Cisco's Worldwide Web site).
>Customers without contracts should contact the Cisco TAC as explained in the
>"Cisco Security Procedures" section of this document, and should refer to
>the URL of this document as evidence of their entitlement.
>
>As with any software upgrade, you should check to make sure that your
>hardware can support the new software before upgrading.  The most common
>problem is inadequate RAM. Assistance is available on Cisco's Worldwide Web
>site at http://www.cisco.com.
>
>Workarounds
>- ---------
>It is possible to work around this problem by preventing interactive access
>to the Cisco IOS device. If only IP-based interactive access is of concern,
>this can be done by using the ip access-class line configuration to apply an
>access list to all virtual terminals in the system. However, it is important
>to remember that non-IP-based means of making interactive connections to
>Cisco IOS devices do exist, and to eliminate those means as possible routes
>of attack. Interactive access can be prevented completely by applying the
>configuration command no exec to any asynchronous line, or the command
>transport input none to any virtual terminal line, that may be accessible to
>untrusted users.
>
>Exploitation and Public Announcements
>=====================================
>Cisco has had no actual reports of malicious exploitation of this
>vulnerability.  However, there have been sporadic reports of unexplained
>crashes that have been consistent with the crashes caused by this
>vulnerability; the vulnerability was initially identified because of such a
>report. It is possible that the reported crashes could have been caused by
>random events, but it is also possible that they could have been deliberate.
>Cisco has essentially no information that would be useful in determining
>which is the case.  None of the customers reporting the crashes indicated
>any suspicion of a deliberate attack.
>
>Cisco knows of no public announcements of this vulnerability before the date
>of this notice.
>
>Status of This Notice
>=====================
>This is a final field notice. Although Cisco cannot guarantee the accuracy
>of all statements in this notice, all the facts have been checked to the
>best of our ability. Cisco does not anticipate issuing updated versions of
>this notice unless there is some material change in the facts. Should there
>be a significant change in the facts, Cisco may update this notice.
>
>Distribution
>- ----------
>This notice will be posted on Cisco's Worldwide Web site at
>http://www.cisco.com/warp/public/770/ioslogin-pub.shtml. In addition to
>Worldwide Web posting, the initial version of this notice is being sent to
>the following e-mail and Usenet news recipients:
>
>   * cust-security-announce@cisco.com
>   * bugtraq@netspace.org
>   * first-teams@first.org (includes CERT/CC)
>   * cisco@spot.colorado.edu
>   * comp.dcom.sys.cisco
>   * first-info@first.org
>   * Various internal Cisco mailing lists
>
>Future updates of this notice, if any, will be placed on Cisco's Worldwide
>Web server, but may or may not be actively announced on mailing lists or
>newsgroups. Users concerned about this problem are encouraged to check the
>URL given above for any updates.
>
>Revision History
>- --------------
> Revision 1.2, 9:00   Initial released version
> AM US/Pacific,
> 10-AUG-1998
>
>Cisco Security Procedures
>=========================
>Please report security issues with Cisco products, and/or sensitive security
>intrusion emergencies involving Cisco products, to security-alert@cisco.com.
>Reports may be encrypted using PGP; public RSA and DSS keys for
>"security-alert@cisco.com" are on the public PGP keyservers.
>
>The alias "security-alert@cisco.com" is used only for reports incoming to
>Cisco. Mail sent to the list goes only to a very small group of users within
>Cisco. Neither outside users nor unauthorized Cisco employees may subscribe
>to "security-alert@cisco.com".
>
>Please do not use "security-alert@cisco.com" for configuration questions,
>for security intrusions that you do not consider to be sensitive
>emergencies, or for general, non-security-related support requests. We do
>not have the capacity to handle such requests through this channel, and will
>refer them to the TAC, delaying response to your questions. We advise
>contacting the TAC directly with these requests. TAC contact numbers are as
>follows:
>
>   * +1 800 553 2447 (toll-free from within North America)
>   * +1 408 526 7209 (toll call from anywhere in the world)
>   * e-mail: tac@cisco.com
>
>All formal public security notices generated by Cisco are sent to the public
>mailing list "cust-security-announce@cisco.com". For information on
>subscribing to this mailing list, send a message containing the single line
>"info cust-security-announce" to "majordomo@cisco.com". An analogous list,
>"cust-security-discuss@cisco.com" is available for public discussion of the
>notices and of other Cisco security issues.
>
>=====================================================================
>This notice is copyright 1998 by Cisco Systems, Inc. This notice may be
>redistributed freely after the release date given at the top of the notice,
>provided that redistributed copies are complete and unmodified, including
>all date and version information.
>
>
>
>-----BEGIN PGP SIGNATURE-----
>Version: PGP for Personal Privacy 5.0
>Charset: noconv
>
>iQEVAwUBNc8clQyPsuGbHvEpAQGIewf+Lml3P8qQaCGrKDtmN+fNsdGBZFi3A0WA
>L0h5ntx97b+sNDWhjIm98NDor8z65atIBjXwO0XLxamzx2aRINQ7l5u10K0tbiBN
>sO+KUSoIiYHJ2FfBrKdk7/9qOhVzR698C/+dUy6Mzfy8Gq1FXoqklXNFuxF4ZKvR
>Vv9J+S/FLiHAG6GCrCEh0TmRwgNEjdRhBwtvWiqMyWpVjPR0L5YCLvWd/xyRF9wr
>1jBORkepojRXWBeKVGnmdD1m+DCLKXmSMQNkg6jO9TeK/Ygjk/NzVNBWLGn8B6EN
>+x/RSQKayR9Nge/RTsOVQJrDZhVilWxcSyWCrgFJ9MWlkvVrlLqsMA==
>=u3pg
>-----END PGP SIGNATURE-----
>
>-----BEGIN PGP PUBLIC KEY BLOCK-----
>Version: PGP for Personal Privacy 5.0
>
>mQENAzPvjNgBbQEIANK7KlAHQsajB9t0ddYhrZNmaOnyPL8T5JZRDq7uSf3HfXZ9
>gcE+DU3/2/TuCa7l/P0fblpUtxOo2FScjdg6Zd/V+8FH++wfH7GP+M2lJIw1N/UN
>hLfqUe7RJZtAvAb2VRpA3pV816ngk0H7tb2RyAsu3H7MvwTDZaZ/dzhM/40uDz2b
>OUjkaoxC/cKLsP+ODLydPK3XPzjq9XipC3AX8zDLbjAMSyNTpQP4c2NvIf6X4Q4Q
>D+yZJu0dYA8i/QC2F9cb4sT6fKtoRENwVLQhHwkxwKLqmyokLLOZ7QvQw1Rqs8ZU
>E4o5OFdf0XvqW2+C1+CWQ5Z987ZHDI+y4Zse8SkABRG0R0Npc2NvIFN5c3RlbXMg
>UHJvZHVjdCBTZWN1cml0eSBJbmNpZGVudCBSZXNwb25zZSBUZWFtIDxwc2lydEBj
>aXNjby5jb20+iQB1AwUQM/DnKABQXdL3LtV5AQEB1gMAntCpluUCoH9Spn+4RBKQ
>U9qVYjZL9ye7Qd9z8uKIUGM7VFMD/ECavREEd6ggYFCX2t1YV1j6805+oROx/xhx
>Ce4OSG2PX6NQx3MchMWgQSiBKFikfxXcbDTwU4HGk/U8iQEVAwUQM++M2AyPsuGb
>HvEpAQFlYwgAk9yGvvH1Rsz3dQAgbzBRiA68u5YYX/b8/n5aTrtxK1Z9KltjdDjc
>U/rv2fqmwhsc9Q2JYE1re/iiUUuxTTXcxCdnLfZ75w6P7v1XaE8HbaXvUbYmFuKx
>vhzI6gnZ3OWEqVQ/P1RB7zzSwHtvMAOmrkty+vFz8g432tDeU/WEif0PAeNassVj
>IBE3mSFcnoF9PwR7+983oLI+QUTz+KZ3po7r7ETFXBaie8MY5vMo2a0ds6GUsrMV
>pFiJ2zruSCJQJvVVoe9VT9pg92fHw6vSYZBf6jcPd+3kUjAcAZQj5Jkuo5QtDc+J
>pCs6A4JS+nk2UPYisFOfxHjR2bv396ymlYkAlQMFEDPw5N0YpviqjmcaIQEBTtAD
>/j5EWQDLLhietlzpjtu2cKAdcjAfi2oUvc1pVVLgqwbNDZaAtFHPWsncPrVqq+T1
>PPe9jmZjCNZj547AGqO4SXlRRCpjaSfpzxceen5jtd/A+oftXmGLFzBJMeBTR2Jq
>/4T/UU+ybqhQoQeHhwLS9+xg6OqVKiKUXWyOoplPkxlkiQEVAwUQM/NXXx9quvkc
>D7cJAQHDZwgAkh5R/OS8SzEVWOOlnUPSaI/PNPSeKdEOOvU5K6u8DMsb/M5775fg
>9paCGi+UngRiL3xWjykJzfrp94F/0d4PpdkcQUEao6+uZBgIbDK9S/W0bDAFCgCn
>wy20JPXxJgdikQb0GLBzP+31WHl4JSMXTuNAFJ8z7Uc/a2JWe3QZ+w8uZP5IyASi
>mYYLu+19Hxo4fYT/bOOQ975zarCgaDO6b4HU68GG3WqytmuBj6Vpu1x5Ia9cNpxg
>PmtM4wg83zmx06fDTGN89EYHrt7dluxCBesxPhUsmZn071Xdq1zMYIzHns4jxwCR
>Ep5kNMtPsUKA8dSA4UO2BdkOq5IX6scTOokAlQMFEDQ+3y4hUGEzf80qPQEBsDEE
>AKIOTsngN/kpD5dJfPX1B/2QbPWm8iuyjOwzMm+BEVswIaIpCJpOxQQqHy89KNyn
>nk2v9IM2FQ/Eb4rp0Zm8G0/BpXRxJVum58bPVIeREE5q19Lz4t6tS9czPkUNQT0d
>hieNQxaRBhvxwqCKq6LqFrDOl5/LLo1xZxZiJ1rtxXOJiQA/AwUQM/KsxSLcSmI6
>S/dwEQKA0QCfR1O0vDQ0M8ef9c+DHPyNydGzOOQAnRscGYHbrrXrN1yuA9mti29p
>z2BViQEVAwUQNJcEyCt8b/RdeFXXAQEmwQgA43Tf3Sv20wCiS1vmt2i+UtvhW4VJ
>AQvqPDkwGIJF8m6fblkh/WP3dPmnPk+mS04UID8IEVJjW6WrG7ED8+SOWGMqHqXh
>qCs7WWS5ygUQsgBfrFeC8hNaFPuu0IpMFTIzK2j+niXrDk3RYNvmCNA6iWZm3XmP
>SEXXbsFdgLmTLdOGMWE61Hj/nRo+L1y0L/hVVVEinghN67K8GERYvhhRPDycNq0g
>/AgiHu5jGb9X1z9RCbN7poLb9nhAgUPN4RGoUqzP74s0Y5a4tl76TqmusaHlG6bs
>0jnYBzmKWjx4ysne6Kx6QXHsNeN1CfBvxo6PkoGOBlrZ3D4DRoF9TRba8YkBFQMF
>EDQ+1ppGYudYIBG4eQEBxBcH/1ZqxuiL4yGeCCm3NWqrxFPGEaCJZG9DqLBlTlNQ
>7Ecv5pBh4syxO4nBDx+/7oVuy+ktAHWysRSRtZQMQtuspKjQvoO6PzbLGnvQf8BO
>9tXt+hY8ZjqRImXL3rDgrQevxpzpcW5bwLZtL8CuEFfSyP6KoqjcEIYEmSyw7pOV
>c5tZZ0QNP507F55VCmgIHzJI9qACYSwJUeK6sZyQsm/sUdWAwre+56NpZfUQ10DK
>s6LElFPN5AguG314Zx1wAyu08/RYTeooTVvaTo2xLEONQ0/sJxN55HoW3FJmco7J
>DRXUF0VUhxFmHt9sKKOVFfmUNqo3ZC1fEFIA8p/8pRbawTeJARUDBRA0PvArS8cZ
>Q0UsQfkBAeKeCACrp5kn52ZLYucF8B/e7qzSrBTabOKNBBwqzGw3876bN/uwgo2G
>/appaNOm3Ark+Qs3bB34xFCikPoydYAWUredjXNQ5QozPr6M9lyqIKyOgXymaU6L
>OWVKvUtDn/TjObRIYFwFaqPjEPuZ0mOLk/GMCX/ogDTJLQtTpA0eGY/urhgFjC1+
>vZA0gRe+Q5zjTTZJxsw2HD+CsE4rGcAw7akeUJrvvy7Z1feKV0S4q6PnQpFNkuYQ
>k9J0wBvflJEF8sUsiJ/PGmInJY50XjVag18IV+Enr/wnW+3H4/of4il6QxbmdVFF
>MgCcuVzAnMcYHo7g14HM/wNbFS+v2LR0rK9biQA/AwUQM++N6GFYFsU6zlX+EQKE
>ywCggc3awk02yj6RivcbYFn3Qon77scAn29CR0lHAjsdLIv6LJ9BLdhXiK8piQCV
>AwUQM++6KXemvD4nAHb9AQG6OQQAq/GzwDk4yT9MPy25AwBMgsPGePRkZ6kBXTBs
>mMnHxthDniyEXqvg6XJYRU86f2wyfzVDJY55qmukl9haCqe3Inxo7gyHaB8ji4rM
>qfmEn2fjbiAvdw5wlQqYBEEYWAviAHpBlTqT7naq5u/TyAdgENROnFu1jLT39uJ4
>RPpO7o2JAJUDBRAz8OmMetUtBpz0lbkBAZnqA/9Vcjr5qpxELEwYmJhBih4Eha0b
>PebxDpT/wDQlWF8KQVT+dVa4/kXDZDSQEOcV+Q+Z0YAxqFFaWHI1CYr2pR+jDqzx
>xdsxvwLPaJ2Yq2vnb/UozPzCYXaRr8dKE2LaRpUIe/frpaKggGfT+HP35WWSAkS4
>yP91I+9xw2xAHC7F/IkAlQMFEDPxEE1/tdR0mmHbCQEBO2YEAPGeRsytUHeL7tUb
>dDgLmz6fcroNkJk6sjQLAw0HYqnHbwhfXCvFQmAb00Whw4xQcSXej3JUJSwXDyEJ
>5AhOD3IdTkKJnJA81xJzYJXhp8kJTF09M5voB5eZg1Fp0bcEw3a2MXy3SWRWfJ7S
>SA2De7dBpf2oOZeI9AuRltHfVmKPiQA/AwUQM++M9JaBp3w9UuB/EQLzmwCgtbsV
>jd1ZZcuJkPoVs3cbzX9JibYAoLcQ8+WP7M0y3zdSUEhHToFY6E+ZiQA/AwUQM/Dx
>S7iwR2HEkUMHEQJK7gCfRWzVa9mGDX4X2BdUB1Z5l5DCM+MAn2SIHiZS3o94TVhp
>+jTL2HWHbnPjiQEVAwUQNEfbw9RZXC+1KH6xAQHyggf/elqk1b1qzh/At6tTS7eS
>pXgL9oEUTYHkCKhsZEXLkaCU424Gpyo3sytqEt1cgajeuxwymieXYk37htovO8tR
>ZW8YeK55aOT6bHtkorKf4Xyf3A+WRHptSJTAlBy+/1zpJ3OH7/26p/LxYQiFKXbA
>vGpCkz2vNn3NPSf7zQwQSZvVASGVDHF4VB5qTliOwb0CbshkVDzZutZmKsE3Z/p2
>2uUhO97ff9+2Sb4Pi9dbjdwW7MhIh/YavV7+7PfiPX9EqsJg7hsTV1+TUES5VInY
>gm0f546Ym9wQCqNuzbnQtfObS9bamO3E40g+AN2siYCvLq0lXbKPhg+rEupixpqI
>oIkAlQMFEDPw6arUWbxRv7Y9YQEBrGYD/AyYF/uH6EJVZww/oASl5pxt2Q9YR5Kb
>60f7RsMOi48SgIV0lrUCk8rEN7HiEMlMSzjqtCuAPbxc85ltYA2V8GMBuz16DZ+L
>shmN2Bdo5HvlJ7oONRfTznAaeKVH40MYI+4oj0Z+mXbhIT48OkQUaWAx+XxdzLuf
>xNNU8oForJ/FiQA/AwUQNDqzpN6/Lw5WBJ4PEQJBMQCffp1SLf282PdNyGCHWRRQ
>ufkFoYYAn2lLhfXQQKccZh/cef3dflJZ9RH7tFBDaXNjbyBTeXN0ZW1zIHByb2R1
>Y3Qgc2VjdXJpdHkgaW5jaWRlbnQvYnVnIHJlcG9ydGluZyA8c2VjdXJpdHktYWxl
>cnRAY2lzY28uY29tPokBFQMFEDPvjV0Mj7Lhmx7xKQEBCCsH/3i8JxEVxwj+F/ff
>f2lCRDD83fJTGhYNYvOACxYaRSs1hwZ1pAWSLUzN+cc3Iqub+dT9zgbubrHFP8kY
>B5oPxEh92myV7d0ijLI82RNc7yrql9MI2H9yIYdgrT2aP98KbGulxri3U9HQ1AnV
>PE43eu8F96fgiOggRqDKi7lWP9ADvcaKO3a1aDk/X2EO1I0jSJMTfZ1cyMlpmrnT
>s3i5x2lX+42GHjpgA3tWGlTN6DFWa5k2dU7TzE3dKL1qz5Zdu81WMdT4xDbk2Q6Z
>8rGu2oKA+YXprSlF0dBsG3qFTKSFgnHijTT4fJI2+gebEzpe8vGUf4FJXQmjZ+bG
>2dTdUKyJAJUDBRAz8OTqGKb4qo5nGiEBASf1BAC13m5KWztxhP4xm+NaszHKE1V7
>d5KodZmNciZaDxJZV7LT9cjvN7nMy3z4YSlCgBoP1mUuXha2E0byKrth2exdD306
>qkXilFK+xhW/kFE87de/A0M3yMkx0/uNwiDBejTxm3VhZMMzGlI1wXsBF9nkzYNX
>0UqGAuuKz70hFxZ56YkBFQMFEDP05SAfarr5HA+3CQEBJhYIAL5FxlRqDRqytTTv
>IYX+Ef6CHgmobHOb/YtOsVUokYWUSfaH9zwuCY8wMYzbRuRGYt9WEWctfiWtiRQz
>gPzD5Sr+AFEWYlCwMEuQ0UPeHUwpO5L16Sq90OUzjqRVkCfNcqLXN/FBovOz5a8W
>arFg9oh06eZc32qEbigqC9WqPO6aRN5eColOZUSf7mcZ/78qxL+tfeEOXc3pZDwt
>XEG4uLV9PqYbb0lePymW79CdZJAipEBUAQO9CHX5HDbuNSanLEYzCwyQfq20kGtF
>KM1sd0nJfExc3FW0UBuWBHf38AZFnkS25vtpx05InXWB5rC4jVxXF4z1oQWMqfuA
>f3/m42KJAD8DBRAz8qzYItxKYjpL93ARAqCHAJ45javDc5ytB2IMInFmFIwwJrXu
>kACgiurcSlvlR1kSdnEn9pmkZH9E5pqJARUDBRA0lwTwK3xv9F14VdcBAShgB/4j
>b3Ybzj1BxB0XoaQYmHgbJcXb1gpZts2Hzw8CZwcDEUow+uyEubS4w1r5BOP4OUJP
>HQz5Cpg6dNmHMyyhahb1GHH8azSYMVlSxWCd3QekLAnkehavqrNcvL942GFqVDOH
>VFFgzBeuhVKjtIQEBo46ENTZvdqu9Z4JZuuOwfWedEGQayUR1kuEOquPLZK+AoPu
>gRyk/6YP0pbmJusFDAAeLIWefEvwa22vB88/mE9/ShcDidSdzvrd+sT3hq2s3NxM
>gHK9PNcaWv/aejnRIXVIYc/Shw/4Dmq5R+z0z2BiEz92ZoWf0nwmAxHkdCsO2ilx
>ZAGVLzbvf+Qsb+CDt85jiQEVAwUQND7WpUZi51ggEbh5AQFOYQf/RwCIvPZYjZ5G
>krKZ9+YvYR0i0XNXkVM+XuUXY6XRdllsDjUZjayYdS5EXvtqGFT8NYU8dSW9rQ8A
>0wyKGsbFJFbC9+P29jTmbJjrIirfz+2Ne8oG00hSIInGj/3kf7MF2DhL/UUrtsgH
>alG04u1yL44qM4wsVQQAMoVvX8qCIPeCaQytOO4H3fJEubJslSQPFZoNS5d6jqoV
>BDV3nKkrypceu6Wy0r8r5kwPkailYGhA2DhybknmnHsbthChwScBq1RobWFcLRUT
>jSJ8Xj3W9bmLHbVS0DmVCgzC0GJwVYwMIuucl27LZAK82drGHLSDE1ATW4HyoXll
>qRtbhpiE/IkBFQMFEDQ/EHtLxxlDRSxB+QEBerYH/0hgLi/20mlDHdSGvlYeKvih
>o9NeXD1x4iYL+WJbY76GVHDntpeXPH5Spcq4E3pJl9pet8c0bDjivSzMbeGycLiG
>69cm/NVAZ26rczqAByPN7nCQYrhk3/n33GAj+CloNm5QEhCacAVxhGsSDAVQD82S
>EFJ8oOBWioy8GDLtrKdBoP5zSP0KIKGHjc09N5ueTYOoaRit7+kay3cvwqYtmz8S
>jawQeWrN7u1pgPF0Yjmh4ruSyCZ0WI4V65qUsra+CfDVa/NT5CuHlisaUzhIP7/2
>ZNf39+BIdivwfFXxlGpSAMoBJgaoYlv8yRWU19viMFbz8FaHG/0JPQ0nzAmxmHOJ
>AD8DBRAz7435YVgWxTrOVf4RAhkwAKDWgIbBaQ/qoR9F/CMhmpYztcsMBwCg2DTh
>E7h3j5HGvsiwy8MsZZmLq5mJAJUDBRAz77opd6a8PicAdv0BAXKbA/9uZcSak/u4
>1uFuow5uwkydjkfHz7XRFK49HX7ozwoJbVydzlURMIOvbwpf6ws/bFTyhM1RRG3b
>5E5o4psXoNWowXG+uNkmTLhXIBOtH4TcjbLXspLWUiNtBNlJ2dDKxit9ye1Z/9cT
>wpfaNyAmtb0aPBN4sZ8r6Bmgd44Vx0nSL4kAlQMFEDPw6ZN61S0GnPSVuQEB3GYE
>AKr3s4jyXIla83Wp5lBxrfC2tq5dal6GLWAHEudYFQ9g8ZXvydUiL8kVsrExNPrP
>F/s4MO9c0F5ueClCnaBU7xMnq3OuTZ1VQoD1KTTfPx9F1KTXdaGdiiiM895sUG1c
>GudLESr2ARVKPZlH27/mpRSuMq1mqgBdw8d/CokK6jmtiQCVAwUQM/EQdH+11HSa
>YdsJAQGKBAP+LRkDVCwWNCpAAFOag6ou3SmFfxD19qRfLPbjlm3nLk6wYvbSXBVp
>1VXMRJkdmCXSxMe0vo1rxCMoL66qVutyHrSgifPPN6AYNPKTTNUx5o0Ck5xXf4PW
>oy8cfvyrKJtd/wDi4RyfWOsZNYKVAf1ItbZse243ICsgMAduzZLgygqJAD8DBRAz
>7410loGnfD1S4H8RAqdjAJ9VVM6GixYnpOpZMvvpuKk3OHowKACfQxP/Dcmqg5Kt
>DPnd6hHMaVbEBAaJAD8DBRAz8PHwuLBHYcSRQwcRAu+bAJoDEDaxddtU35mekCgl
>NjbHLmOR+gCgiYpy0fB8JtNJE0k3xQDuW0H8uG2JARUDBRA0R9vC1FlcL7UofrEB
>AX83CACnzy639fH4Sor48FEVPITZjMq/RkNR1aMhP3dS+XRY12R5fQdYPFSqHS/B
>4e9VB0tJDdtgrBqQ7jsxofxPNgS1bjtTzqw0NSYqXtCQuVATjE6nF4WeqrreAtX2
>eLq1w2parrHSiB7yztVXUC/ek07r67CFaIeYHOZNI8OuUjzOxU+ZqLiZre/vA9Yn
>dkiC25wHB/gsu4lW1dLZE3lPPxExZypA4L9zhlAa8bE5+P+3axoNJO4CnkUfUXCX
>bl+y/mcsaNg7if5SYVBKZjcKjNmXk1mNuroBASrDYcJiB8xV2tLOX2wCWdXoLm4o
>C0JzWFRzgeSNI8TtO/6zqjqO5jeeiQCVAwUQM/Dpt9RZvFG/tj1hAQEm2QP/cGA2
>E5r7aErryNMjiExoJofJEgjjAJl4pISOgEmcvBoZD1+zmNsm19iMO11wKS9JnLg6
>9dxZvsa7fU8psmAG0Z5j42z59RqGFTP6Kzfkf7f5m5X3W/npJbzCpwoQO3jRX2DV
>M/lfpUT5B9eehJwV2MJs5WLChHqxo8SS6MkBK7KJAD8DBRA0OrOk3r8vDlYEng8R
>Agl6AKDlMjVFv3gKMloyxLEZEQT/QggmowCfVqd3eHVSyoRRa8VZIuoFsRDRpSk=
>=MuH2
>-----END PGP PUBLIC KEY BLOCK-----
>

=============================================================================
"inet-admins" Internet access mailing list. Maintained by East Connection ISP.
Mail "unsubscribe inet-admins" to Majordomo@info.east.ru if you want to quit.
Archive is accessible on http://info.east.ru/rus/inetadm.html



 




Copyright © Lexa Software, 1996-2009.