From owner-freebsd-questions Mon Jun 26 06:06:42 1995 Return-Path: questions-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id GAA11539 for questions-outgoing; Mon, 26 Jun 1995 06:06:42 -0700 Received: from helix.nih.gov (helix.nih.gov [128.231.2.3]) by freefall.cdrom.com (8.6.10/8.6.6) with SMTP id GAA11533 for ; Mon, 26 Jun 1995 06:06:40 -0700 Received: by helix.nih.gov (940715.SGI.52/1.35(m-sg-1.0)) id AA20295; Mon, 26 Jun 95 09:06:38 -0400 Date: Mon, 26 Jun 95 09:06:38 -0400 From: crtb@helix.nih.gov (Chuck Bacon) Message-Id: <9506261306.AA20295@helix.nih.gov> To: freebsd-questions@freefall.cdrom.com Subject: News piece in Washington Post this morning Sender: questions-owner@FreeBSD.org Precedence: bulk Sorry I couldn't find FreeBSD mentioned in a better light :-( Here is a complete transcription from a box on page 17 of the Washington Business section of the Washington Post, June 26, 1995: << DIGITALFLUBS A piece of security software widely used on computer networks has a hole in it. The federally funded Computer Emergency Response Team said it has distributed instructions on how to correct the problem in FreeBSD, a program created by a software engineer in the Netherlands. In some circumstances, the hole lets people tapping into a computer see and alter informaiton that should be off-limits to them. FreeBSD is an "enhancement" to S/Key, a program that controls password access to networked computers. S/Key itself does not have the problem. >> Jordan, you often get blamed for FreeBSD. So what did you do this time? Chuck Bacon - crtb@helix.nih.gov ABHOR SECRECY - DEFEND PRIVACY