From owner-freebsd-security Fri Apr 21 11:26:52 2000 Delivered-To: freebsd-security@freebsd.org Received: from neon.delete.org (cx638115-d.sthngtn1.ct.home.com [24.2.165.84]) by hub.freebsd.org (Postfix) with ESMTP id BC46037BCD0 for ; Fri, 21 Apr 2000 11:26:48 -0700 (PDT) (envelope-from alex@delete.org) Received: from localhost (alex@localhost) by neon.delete.org (8.10.0.Beta6/8.10.0.Beta6) with ESMTP id e3LIQeu05253 for ; Fri, 21 Apr 2000 14:26:40 -0400 (EDT) Date: Fri, 21 Apr 2000 14:26:40 -0400 (EDT) From: Alex Michlin X-Sender: alex@cx638115-d.sthngtn1.ct.home.com To: freebsd-security@FreeBSD.ORG In-Reply-To: <6381A6A8826BD31199500090279CAFBA106958@FOGHORN> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org How can a hacker enable promiscious mode though an ftp connection? I did a `last` to see who, if anyone, logged on and the only logon I saw was an ftp connection from an @home machine. I don't see any extra programs running on the machine. Do I need to be concerned about telnet passwords, etc? Apr 20 13:10:12 hostname /kernel: xl0: promiscuous mode enabled Thanks for your time. Alex To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message