From owner-freebsd-security Sun Feb 16 13:28:35 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id NAA28411 for security-outgoing; Sun, 16 Feb 1997 13:28:35 -0800 (PST) Received: from relay.nuxi.com (nuxi.ucdavis.edu [128.120.37.176]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id NAA28071; Sun, 16 Feb 1997 13:20:38 -0800 (PST) Received: from dragon.nuxi.com (reqb-055.ucdavis.edu [128.120.254.55]) by relay.nuxi.com (8.8.4/8.6.12) with ESMTP id NAA03127; Sun, 16 Feb 1997 13:20:44 -0800 (PST) Received: (from obrien@localhost) by dragon.nuxi.com (8.8.5/8.7.3) id VAA08208; Sun, 16 Feb 1997 21:20:31 GMT Message-ID: <19970216132031.XX10822@dragon.nuxi.com> Date: Sun, 16 Feb 1997 13:20:31 -0800 From: obrien@NUXI.com (David O'Brien) To: freebsd-security@freebsd.org, stable@freebsd.org Cc: core@freebsd.org Subject: (fwd) Re: Shell Access X-Mailer: Mutt 0.60_p2-3,5,8-9 Mime-Version: 1.0 X-Disclaimer: Mutt Bites! Organization: The NUXI *BSD group X-PGP-Fingerprint: B7 4D 3E E9 11 39 5F A3 90 76 5D 69 58 D9 98 7A X-Pgp-Keyid: 34F9F9D5 Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk This is from CalWeb ISP in Sacramento CA. They were running 2.1-STABLE on the shell account machines. They are now running 2.2-970207-GAMMA. This ISP's resonce to the setlocale vulnerability was to shut off shell accounts for several days (and w/o notice to it's customers). -- forwarded message -- Path: calweb!not-for-mail From: rdugaue@calweb.com (Robert Du Gaue) Newsgroups: calweb.general Subject: Re: Shell Access Date: 7 Feb 1997 15:49:30 GMT Organization: CalWeb Internet Services, Inc. Lines: 19 Message-ID: <5dfiua$j37$1@news.calweb.com> References: <32FADDA2.8FF@calweb.com> NNTP-Posting-Host: web1.calweb.com X-Newsreader: TIN [UNIX 1.3 950824BETA PL0] Xref: calweb calweb.general:634 Steve Phariss (rebo@calweb.com) wrote: : Can we have more details on the shell access??? : : Motd 02/07/97: : : > 02/07/97 Shell logins are disabled until a new security : > release is made available. We appologize : > for the inconvenience. : > : : Any idea how long till access is going to be restored? A new security release for the OS is expected within the next couple of days (rumor has it 'anytime', maybe today). -------------------------------------------------------------------------- Robert Du Gaue - rdugaue@calweb.com http://www.calweb.com President, CalWeb Internet Services Inc. (916) 641-9320 -------------------------------------------------------------------------- -- end of forwarded message --