From owner-freebsd-security Wed Jan 19 7:18: 9 2000 Delivered-To: freebsd-security@freebsd.org Received: from nsm.htp.org (nsm.htp.org [202.241.243.104]) by hub.freebsd.org (Postfix) with SMTP id 2276214A13 for ; Wed, 19 Jan 2000 07:18:05 -0800 (PST) (envelope-from sen_ml@eccosys.com) Received: (qmail 25339 invoked from network); 19 Jan 2000 15:16:52 -0000 Received: from localhost (127.0.0.1) by localhost with SMTP; 19 Jan 2000 15:16:52 -0000 To: freebsd-security@FreeBSD.ORG Subject: Re: ssh-feature 'backdoor' From: sen_ml@eccosys.com In-Reply-To: <20000119165350.E8404@is.co.za> References: <20000119155203.C8404@is.co.za> <20000119154348.A6412@supra.rotterdam.luna.net> <20000119165350.E8404@is.co.za> X-Mailer: Mew version 1.94.1 on Emacs 20.5 / Mule 4.0 (HANANOEN) X-No-Archive: Yes Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-Id: <20000120001840W.1000@eccosys.com> Date: Thu, 20 Jan 2000 00:18:40 +0900 X-Dispatcher: imput version 990905(IM130) Lines: 6 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org marcs> Ah ok -- I see what you mean. I suppose another way you could kind of marcs> prevent this is to use tcp_wrappers thereby being sure that only the marcs> hosts you want can get into the box. 'being sure' is a bit strong don't you think? if someone has spoofed the ip address it doesn't help you at all. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message