> this problem is that it would give any internet hackers the ability to
> discover the network topology (including which servers host NDS master
> and replica databases). Not very secure. The concern for Petr is if in
If knowing the server makes it vulnerable, the server has other
problems sti
Gregory Maxwell wrote:
>
> On Tue, Nov 14, 2000 at 01:29:31PM -0700, Jeff V. Merkey wrote:
> > Hopefully, sanity will rule out here. I information being leaked from
> > what I reviewed was the ability for a hacker to exploit port 524 and use
> > it
> > to obtain a local copy of the entire rout
On Tue, Nov 14, 2000 at 01:29:31PM -0700, Jeff V. Merkey wrote:
> Hopefully, sanity will rule out here. I information being leaked from
> what I reviewed was the ability for a hacker to exploit port 524 and use
> it
> to obtain a local copy of the entire routing table for other IP servers
> INSID
Petr Vandrovec wrote:
>
> On 14 Nov 00 at 12:11, Jeff V. Merkey wrote:
>
> > If you are relying on port 524 to get SAP information for NCPFS over
> > TCPIP, you may want to track this since it appears Novell will be
> > patching this port to close a security flaw. I
> > added the tracking URL
On 14 Nov 00 at 12:11, Jeff V. Merkey wrote:
> If you are relying on port 524 to get SAP information for NCPFS over
> TCPIP, you may want to track this since it appears Novell will be
> patching this port to close a security flaw. I
> added the tracking URL so you can review what changes they a
Petr/Linux,
If you are relying on port 524 to get SAP information for NCPFS over
TCPIP, you may want to track this since it appears Novell will be
patching this port to close a security flaw. I
added the tracking URL so you can review what changes they are
proposing. I think what they
are p
6 matches
Mail list logo