From owner-freebsd-security Fri Jan 21 16:46:41 2000 Delivered-To: freebsd-security@freebsd.org Received: from sand2.sentex.ca (sand2.sentex.ca [209.167.248.3]) by hub.freebsd.org (Postfix) with ESMTP id 7E499156C9 for ; Fri, 21 Jan 2000 16:46:31 -0800 (PST) (envelope-from mike@sentex.net) Received: from p10 (ospf-mdt.sentex.net [205.211.164.81]) by sand2.sentex.ca (8.9.3/8.9.3) with SMTP id TAA78501 for ; Fri, 21 Jan 2000 19:46:28 -0500 (EST) (envelope-from mike@sentex.net) Message-Id: <4.1.20000121194127.0568c220@granite.sentex.ca> X-Sender: mdtancsa@granite.sentex.ca X-Mailer: QUALCOMM Windows Eudora Pro Version 4.1 Date: Fri, 21 Jan 2000 19:45:12 -0500 To: freebsd-security@FreeBSD.ORG From: Mike Tancsa Subject: finding 'attack platforms' (was Re: Some observations on stream.c and streamnt.c) In-Reply-To: <200001212349.PAA64869@apollo.backplane.com> References: <200001212258.OAA64329@apollo.backplane.com> <20000121171759.D56672@baileylink.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org At 06:49 PM 1/21/00 , Matthew Dillon wrote: > Every time a new hole is found, ISPs have to run to get it closed. The The closest call we had was the qpopper bug a few summers back. 6hrs after the bugtraq post, and 2hrs just after I had patched our pop3 server, we were getting attempts on the order of 4 to 5 a day from different locations. Its a nasty race :-( ---Mike ********************************************************************** Mike Tancsa * mike@sentex.net Sentex Communications Corp, * http://www.sentex.net/mike Cambridge, Ontario * 519 651 3400 Canada * To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message