[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed



On Thu, Apr 05, 2001 at 12:12:07PM -0700, Eric N. Valor wrote:
> Here's a useful URL I have bookmarked:
> 
> http://www.isi.edu/in-notes/iana/assignments/port-numbers

 /usr/share/nmap/nmap-services lists unofficial port numbers that are in
use.  

yeti:~$ grep 2064 /usr/share/nmap/nmap-services 
distrib-net-losers 2064/tcp  # A group of lamers working on a silly
closed-source client for solving the RSA cryptographic challenge.  This is
the keyblock proxy port.

 It used to be s/losers/assholes/ and s/silly/stupid/, IIRC.  I don't know
when it got toned down :)  It's always funny when people leave their
opinions in their software.

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X(peter@llama.nslug. , ns.ca)

"The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces!" -- Plautus, 200 BCE



Reply to: