From owner-freebsd-security Mon Oct 11 21: 9: 2 1999 Delivered-To: freebsd-security@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 758) id DB6FC14F63; Mon, 11 Oct 1999 21:09:00 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by hub.freebsd.org (Postfix) with ESMTP id CE16C1CD482; Mon, 11 Oct 1999 21:09:00 -0700 (PDT) (envelope-from kris@hub.freebsd.org) Date: Mon, 11 Oct 1999 21:09:00 -0700 (PDT) From: Kris Kennaway To: tom brown Cc: security@freebsd.org Subject: Re: Is it just me or is the ssh port broken for Release 3.3? In-Reply-To: <19991012035516.7083.rocketmail@web109.yahoomail.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Mon, 11 Oct 1999, tom brown wrote: > I have two points realy. > > 1. Why is such an importaint package as rasref20 > broken?(Is it to allow the NSA to trojan it?) Yes :-) > 2. Now the US govenment have dropped the export > control law's, can we have these components ether on > the CD-ROM or the the main website? They have not been dropped. As far as it effects FreeBSD, things are the same as they always have been. Kris ---- XOR for AES -- join the campaign! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message