Date: Fri, 17 Aug 2001 14:37:25 -0700 From: "Bruce A. Mah" <bmah@FreeBSD.ORG> To: "Jonathan M. Slivko" <jslivko@4evermail.com> Cc: "Nate Williams" <nate@yogotech.com>, "Matt Piechota" <piechota@argolis.org>, "Carroll, D. (Danny)" <Danny.Carroll@mail.ing.nl>, freebsd-security@FreeBSD.ORG, freebsd-hackers@FreeBSD.ORG Subject: Re: Silly crackers... NT is for kids... Message-ID: <200108172137.f7HLbPT12574@intruder.bmah.org> In-Reply-To: <007901c12762$d3ac7ea0$8701a8c0@equinox> References: <98829DC07ECECD47893074C4D525EFC311561F@citsnl007.europe.intranet><20010817165323.F4969-100000@cithaeron.argolis.org> <15229.34962.653064.226276@nomad.yogotech.com> <007901c12762$d3ac7ea0$8701a8c0@equinox>
next in thread | previous in thread | raw e-mail | index | archive | help
--==_Exmh_1009623041P Content-Type: text/plain; charset=us-ascii If memory serves me right, "Jonathan M. Slivko" wrote: > Which just brings me to another point, why not just turn ssh on by default > and turn telnetd off by default, given the latest exploit. Thanks for > bringing up a point that I wanted to bring to the security team for awhile. From the release notes for -CURRENT and 4-STABLE: All services in inetd.conf are now disabled by default for new installations. sysinstall(8) gives the option of enabling or disabling inetd(8) on new installations, as well as editing inetd.conf. Bruce. --==_Exmh_1009623041P Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: Exmh version 2.3.1+ 05/14/2001 iD8DBQE7fY6V2MoxcVugUsMRAjWFAKD3ma6yZ79564ihsDgvJZcVBth3RgCeIbZo XsPMaAgvD+VzSd/dTPa6lI4= =ozkt -----END PGP SIGNATURE----- --==_Exmh_1009623041P-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200108172137.f7HLbPT12574>