From owner-freebsd-security Mon Jul 28 21:10:12 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id VAA05709 for security-outgoing; Mon, 28 Jul 1997 21:10:12 -0700 (PDT) Received: from rocky.mt.sri.com (rocky.mt.sri.com [206.127.76.100]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id VAA05703 for ; Mon, 28 Jul 1997 21:10:07 -0700 (PDT) Received: (from nate@localhost) by rocky.mt.sri.com (8.7.5/8.7.3) id WAA10250; Mon, 28 Jul 1997 22:09:50 -0600 (MDT) Date: Mon, 28 Jul 1997 22:09:50 -0600 (MDT) Message-Id: <199707290409.WAA10250@rocky.mt.sri.com> From: Nate Williams MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit To: Vincent Poy Cc: "Jonathan A. Zdziarski" , security@freebsd.org Subject: Re: security hole in FreeBSD In-Reply-To: References: X-Mailer: VM 6.29 under 19.15 XEmacs Lucid Sender: owner-freebsd-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Vincent Poy writes: > Apparently FreeBSD ships with .rhosts in the root account. Apparently you've yet to find a clue. Go rub yourself with clue juice, and dance the clue dance, and maybe you'll get one. Nate