Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jan 2000 19:45:12 -0500
From:      Mike Tancsa <mike@sentex.net>
To:        freebsd-security@FreeBSD.ORG
Subject:   finding 'attack platforms' (was Re: Some observations on stream.c and streamnt.c)
Message-ID:  <4.1.20000121194127.0568c220@granite.sentex.ca>
In-Reply-To: <200001212349.PAA64869@apollo.backplane.com>
References:  <Pine.BSF.4.10.10001211649440.4460-100000@tetron02.tetronsoftware.com> <200001212258.OAA64329@apollo.backplane.com> <20000121171759.D56672@baileylink.net>

next in thread | previous in thread | raw e-mail | index | archive | help
At 06:49 PM 1/21/00 , Matthew Dillon wrote:
>    Every time a new hole is found, ISPs have to run to get it closed.  The 

The closest call we had was the qpopper bug a few summers back.  6hrs after
the bugtraq post, and 2hrs just after I had patched our pop3 server, we
were getting attempts on the order of 4 to 5 a day from different
locations.  Its a nasty race :-(

	---Mike
**********************************************************************
Mike Tancsa                       *  mike@sentex.net
Sentex Communications Corp,       *  http://www.sentex.net/mike
Cambridge, Ontario                *  519 651 3400
Canada                            *


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.1.20000121194127.0568c220>