[35543] in North American Network Operators' Group
Re: tcp,guardent,bellovin
daemon@ATHENA.MIT.EDU (Scott Francis)
Mon Mar 12 19:15:00 2001
Date: Sun, 11 Mar 2001 08:43:57 -0800
From: Scott Francis <scott@virtualis.com>
To: "Steven M. Bellovin" <smb@research.att.com>
Cc: Chris Beggy <chrisb@kippona.com>, nanog@merit.edu
Message-ID: <20010311084357.L3303@virtualis.com>
Mail-Followup-To: Scott Francis <scott@virtualis.com>,
"Steven M. Bellovin" <smb@research.att.com>,
Chris Beggy <chrisb@kippona.com>, nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010312145008.4E65335C42@berkshire.research.att.com>; from smb@research.att.com on Mon, Mar 12, 2001 at 09:50:08AM -0500
Errors-To: owner-nanog-outgoing@merit.edu
On or around Mon, Mar 12, 2001 at 09:50:08AM -0500, Steven M. Bellovin may have written:
>
> In message <87hf0z59qe.fsf@lackawana.kippona.com>, Chris Beggy writes:
> >
> >
> >tcp,guardent,bellovin are all mentioned in a WSJ article on DOS
> >and session hijacking, but I don't see anything on CERT yet.
> >
> >Any details? Any incidents using the exploit guardent has
> >identified?
>
> Not to my knowledge...
>
> The folks at Guardent are talking to CERT and to various vendors about
> the problem before releasing any details.
>
> --Steve Bellovin, http://www.research.att.com/~smb
so WSJ is considered a vendor these days?
--
Scott Francis scott@ [work:] v i r t u a l i s . c o m
Systems Analyst darkuncle@ [home:] d a r k u n c l e . n e t
PGP fingerprint 7ABF E2E9 CD54 A1A8 804D 179A 8802 0FBA CB33 CCA7
illum oportet crescere me autem minui