From owner-freebsd-security Wed Aug 12 10:01:30 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id KAA25838 for freebsd-security-outgoing; Wed, 12 Aug 1998 10:01:30 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from lariat.lariat.org (lariat.lariat.org [206.100.185.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id KAA25821 for ; Wed, 12 Aug 1998 10:01:27 -0700 (PDT) (envelope-from brett@lariat.org) Received: (from brett@localhost) by lariat.lariat.org (8.8.8/8.8.6) id LAA00346; Wed, 12 Aug 1998 11:00:59 -0600 (MDT) Message-Id: <199808121700.LAA00346@lariat.lariat.org> X-Sender: brett@127.0.0.1 X-Mailer: QUALCOMM Windows Eudora Pro Version 4.1.0.44 (Beta) Date: Wed, 12 Aug 1998 11:00:53 -0600 To: freebsd-security@FreeBSD.ORG From: Brett Glass Subject: Re: UDP port 31337 In-Reply-To: References: <3.0.5.32.19980812112915.0092ead0@mail.scancall.no> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org If someone's trying to BO you, they deserve worse. How about a daemon that sends fatal packets back TO the machine running BO? I'm sure that these punks haven't protected their code adequately against buffer overflows, etc. --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message