From owner-freebsd-security Fri Jan 21 9:52:18 2000 Delivered-To: freebsd-security@freebsd.org Received: from lariat.lariat.org (lariat.lariat.org [206.100.185.2]) by hub.freebsd.org (Postfix) with ESMTP id E981715494 for ; Fri, 21 Jan 2000 09:52:05 -0800 (PST) (envelope-from brett@lariat.org) Received: from workhorse (IDENT:ppp0.lariat.org@lariat.lariat.org [206.100.185.2]) by lariat.lariat.org (8.9.3/8.9.3) with ESMTP id KAA21217 for ; Fri, 21 Jan 2000 10:52:02 -0700 (MST) Message-Id: <4.2.2.20000121104921.01a55b80@localhost> X-Sender: brett@localhost X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.2 Date: Fri, 21 Jan 2000 10:51:59 -0700 To: security@freebsd.org From: Brett Glass Subject: Traffic on Bugtraq Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Funny: I've posted a few items to Bugtraq containing workarounds for the stream.c 'sploit, and NONE of them have come back to me via the list. In fact, I've gotten no traffic from this normally busy list since yesterday noon. I wonder: is "Aleph Null" off patching systems? Or was the list server itself, or one of its upstream routers, hit? --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message