Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Aug 2001 14:37:25 -0700
From:      "Bruce A. Mah" <bmah@FreeBSD.ORG>
To:        "Jonathan M. Slivko" <jslivko@4evermail.com>
Cc:        "Nate Williams" <nate@yogotech.com>, "Matt Piechota" <piechota@argolis.org>, "Carroll,     D. (Danny)" <Danny.Carroll@mail.ing.nl>, freebsd-security@FreeBSD.ORG, freebsd-hackers@FreeBSD.ORG
Subject:   Re: Silly crackers... NT is for kids... 
Message-ID:  <200108172137.f7HLbPT12574@intruder.bmah.org>
In-Reply-To: <007901c12762$d3ac7ea0$8701a8c0@equinox> 
References:  <98829DC07ECECD47893074C4D525EFC311561F@citsnl007.europe.intranet><20010817165323.F4969-100000@cithaeron.argolis.org> <15229.34962.653064.226276@nomad.yogotech.com> <007901c12762$d3ac7ea0$8701a8c0@equinox>

next in thread | previous in thread | raw e-mail | index | archive | help
--==_Exmh_1009623041P
Content-Type: text/plain; charset=us-ascii

If memory serves me right, "Jonathan M. Slivko" wrote:

> Which just brings me to another point, why not just turn ssh on by default
> and turn telnetd off by default, given the latest exploit. Thanks for
> bringing up a point that I wanted to bring to the security team for awhile.

From the release notes for -CURRENT and 4-STABLE:

   All services in inetd.conf are now disabled by default for new
   installations. sysinstall(8) gives the option of enabling or disabling
   inetd(8) on new installations, as well as editing inetd.conf.

Bruce.



--==_Exmh_1009623041P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: Exmh version 2.3.1+ 05/14/2001

iD8DBQE7fY6V2MoxcVugUsMRAjWFAKD3ma6yZ79564ihsDgvJZcVBth3RgCeIbZo
XsPMaAgvD+VzSd/dTPa6lI4=
=ozkt
-----END PGP SIGNATURE-----

--==_Exmh_1009623041P--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200108172137.f7HLbPT12574>