[35543] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: tcp,guardent,bellovin

daemon@ATHENA.MIT.EDU (Scott Francis)
Mon Mar 12 19:15:00 2001

Date: Sun, 11 Mar 2001 08:43:57 -0800
From: Scott Francis <scott@virtualis.com>
To: "Steven M. Bellovin" <smb@research.att.com>
Cc: Chris Beggy <chrisb@kippona.com>, nanog@merit.edu
Message-ID: <20010311084357.L3303@virtualis.com>
Mail-Followup-To: Scott Francis <scott@virtualis.com>,
	"Steven M. Bellovin" <smb@research.att.com>,
	Chris Beggy <chrisb@kippona.com>, nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <20010312145008.4E65335C42@berkshire.research.att.com>; from smb@research.att.com on Mon, Mar 12, 2001 at 09:50:08AM -0500
Errors-To: owner-nanog-outgoing@merit.edu


On or around Mon, Mar 12, 2001 at 09:50:08AM -0500, Steven M. Bellovin may have written:
> 
> In message <87hf0z59qe.fsf@lackawana.kippona.com>, Chris Beggy writes:
> >
> >
> >tcp,guardent,bellovin are all mentioned in a WSJ article on DOS
> >and session hijacking, but I don't see anything on CERT yet.
> >
> >Any details? Any incidents using the exploit guardent has
> >identified?
> 
> Not to my knowledge...
> 
> The folks at Guardent are talking to CERT and to various vendors about 
> the problem before releasing any details.
> 
> 		--Steve Bellovin, http://www.research.att.com/~smb

so WSJ is considered a vendor these days?

-- 
Scott Francis           scott@   [work:] v i r t u a l i s . c o m
Systems Analyst     darkuncle@   [home:] d a r k u n c l e . n e t
PGP fingerprint 7ABF E2E9 CD54 A1A8 804D  179A 8802 0FBA CB33 CCA7             
               illum oportet crescere me autem minui


home help back first fref pref prev next nref lref last post