From owner-freebsd-security Sun Nov 1 01:01:17 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id BAA00997 for freebsd-security-outgoing; Sun, 1 Nov 1998 01:01:17 -0800 (PST) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from witch.xtra.co.nz (witch.xtra.co.nz [202.27.184.8]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA00991 for ; Sun, 1 Nov 1998 01:01:15 -0800 (PST) (envelope-from junkmale@pop3.xtra.co.nz) Received: from wocker (210-55-210-87.ipnets.xtra.co.nz [210.55.210.87]) by witch.xtra.co.nz (8.9.1/8.9.1) with SMTP id WAA12524 for ; Sun, 1 Nov 1998 22:01:01 +1300 (NZDT) Message-Id: <199811010901.WAA12524@witch.xtra.co.nz> From: "Dan Langille" Organization: DVL Software Limited To: security@FreeBSD.ORG Date: Sun, 1 Nov 1998 22:01:10 +1300 MIME-Version: 1.0 Content-type: text/plain; charset=US-ASCII Content-transfer-encoding: 7BIT Subject: no telnet. how secure? Reply-to: junkmale@xtra.co.nz X-mailer: Pegasus Mail for Win32 (v3.01b) Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org I don't allow telnet to my box. I'm the only user. I'm running a webserver, but it's not published. There's no CGI apart from what came with Apache. How vulnerable is such a machine to attack? I would like to exclude DOS attacks from this discussion as I feel thats something outside the scope of this question. -- Dan Langille The FreeBSD Diary - my [mis]adventures http://www.FreeBSDDiary.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message