From owner-freebsd-security Mon Dec 4 16:53:52 2000 From owner-freebsd-security@FreeBSD.ORG Mon Dec 4 16:53:51 2000 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from earth.backplane.com (placeholder-dcat-1076843399.broadbandoffice.net [64.47.83.135]) by hub.freebsd.org (Postfix) with ESMTP id 5524237B400 for ; Mon, 4 Dec 2000 16:53:51 -0800 (PST) Received: (from dillon@localhost) by earth.backplane.com (8.11.1/8.9.3) id eB50rpT78744; Mon, 4 Dec 2000 16:53:51 -0800 (PST) (envelope-from dillon) Date: Mon, 4 Dec 2000 16:53:51 -0800 (PST) From: Matt Dillon Message-Id: <200012050053.eB50rpT78744@earth.backplane.com> To: Matt Dillon Cc: "David G. Andersen" , JHowie@MSN.com (John Howie), freebsd-security@FreeBSD.ORG Subject: Re: Fw: NAPTHA Advisory Updated - BindView RAZOR References: <200012050043.RAA27046@faith.cs.utah.edu> <200012050049.eB50nWg78677@earth.backplane.com> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org I think the NFS attack mentioned at the end of the report is more of a concern, though typically NFS ports are not left open to the world. NFS currently has no timeouts whatsoever for TCP connections. -Matt To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message