Re: [SECURITY] [DSA 045-1] ntp remote root exploit fixed
Peter Cordes wrote:
> yeti:~$ grep 2064 /usr/share/nmap/nmap-services
> distrib-net-losers 2064/tcp # A group of lamers working on a silly
> closed-source client for solving the RSA cryptographic challenge. This is
> the keyblock proxy port.
>
> It used to be s/losers/assholes/ and s/silly/stupid/, IIRC. I don't know
> when it got toned down :) It's always funny when people leave their
> opinions in their software.
And I've seen more than one of those free web based port scanner utilities that
run on nmap underneath reporting that exact output when it finds a server =)
mike
Reply to: