From owner-freebsd-security Mon Jul 10 12:47:30 1995 Return-Path: security-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id MAA19910 for security-outgoing; Mon, 10 Jul 1995 12:47:30 -0700 Received: from statler.csc.calpoly.edu (statler.csc.calpoly.edu [129.65.17.8]) by freefall.cdrom.com (8.6.10/8.6.6) with ESMTP id MAA19903 for ; Mon, 10 Jul 1995 12:47:27 -0700 Received: (from nlawson@localhost) by statler.csc.calpoly.edu (8.6.12/N8) id MAA03912 for security@freebsd.org; Mon, 10 Jul 1995 12:47:26 -0700 Date: Mon, 10 Jul 1995 12:47:26 -0700 From: Nathan Lawson Message-Id: <199507101947.MAA03912@statler.csc.calpoly.edu> To: security@freebsd.org Subject: nfs auth structure for mountd Content-Length: 318 Sender: security-owner@freebsd.org Precedence: bulk Earlier on this list, someone brought up the fact that mountd always relies on the AUTH_UNIX structure to determine client credentials instead of checking for a secure port. Has anyone written a patch for mountd to check the port? I am willing to do so, but it would be way down my list of things to do. Thanks Nate