Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 11 Dec 2017 14:25:28 -0800
From:      "Chris H" <portmaster@BSDforge.com>
To:        "Dave Horsfall" <dave@horsfall.org>
Cc:        "FreeBSD Ports" <freebsd-ports@freebsd.org>
Subject:   Re: Procmail Vulnerabilities check
Message-ID:  <8d38bfb054feaa5fa3ad1998fb04bcf6@udns.ultimatedns.net>
In-Reply-To: <alpine.BSF.2.21.1712120851490.35694@aneurin.horsfall.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 12 Dec 2017 08:54:26 +1100 (EST) "Dave Horsfall" <dave@horsfall=2Eorg=
> said

> On Mon, 11 Dec 2017, Chris H wrote:
>=20
> > pf(4) has dropped any/all communication from the showdan "project"=20
> > *long* ago for all the systems I'm responsible for, and along with all=
=20
> > the myriad of other "like" projects=2E They all have the policy backward;=
=20
> > ask *before* not *after*=2E
>=20
> I'd love to do that; what's the IP range of their scanners (I assume that=
=20
> they have more than one)?
Sure=2E I'll pull them out of my tables, and send you a copy off-list=2E
>=20
> --=20
> Dave Horsfall DTM (VK2KFU)  "Those who don't understand security will
> suffer=2E"

--Chris





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8d38bfb054feaa5fa3ad1998fb04bcf6>