From owner-freebsd-ports Fri Apr 7 06:06:22 1995 Return-Path: ports-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id GAA05734 for ports-outgoing; Fri, 7 Apr 1995 06:06:22 -0700 Received: from aries.ibms.sinica.edu.tw ([140.109.40.248]) by freefall.cdrom.com (8.6.10/8.6.6) with ESMTP id GAA05725 for ; Fri, 7 Apr 1995 06:06:03 -0700 Received: (from taob@localhost) by aries.ibms.sinica.edu.tw (8.6.11/8.6.9) id VAA22036; Fri, 7 Apr 1995 21:05:53 +0800 Date: Fri, 7 Apr 1995 21:05:52 +0800 (CST) From: Brian Tao To: FREEBSD-PORTS-L Subject: Re: SATAN ported?? In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: ports-owner@FreeBSD.org Precedence: bulk On Thu, 6 Apr 1995, Andrey A. Chernov, Black Mage wrote: > > At least NFS export with portmapper, tftp and unrestricted X access > holes must be present AFAIK, but I am not shure. I have one filesystem exported read-write to my other FreeBSD box only, but SATAN didn't flag that as a vulnerability. Only xhost authentication is being used on my X server (SATAN didn't flag anything there, except to note I was running X on port 6000). tftp is disabled by default in FreeBSD's inetd.conf, is it not? -- Brian ("Though this be madness, yet there is method in't") Tao taob@gate.sinica.edu.tw <-- work ........ play --> taob@io.org