[447] in Intrusion Detection Systems
Re: Brief Intro to the List
daemon@ATHENA.MIT.EDU (John Epstein)
Fri Dec 15 03:27:44 1995
From: kludge@passport.ca (John Epstein)
To: ids@uow.edu.au
Date: Thu, 14 Dec 1995 13:40:41 -0500 (EST)
In-Reply-To: <199512131416.JAA14209@nfs1.jvnc.net> from "Timothy Edward Pettigre
w" at Dec 13, 95 09:16:31 am
X-Mailer: ELM [version 2.4 PL23]
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Sender: owner-ids
Precedence: bulk
Reply-To: ids
Nice to hear from someone!
I'll delurk too-
My name is John Epstein, and I do a reasonable deal of system integration for
security minded clients, as well as operating Toronto Canada's premier ISP.
We run Solaris 2.4 on multiprocessor Sparc 20s and use Livingston Portmasters
for our dialup facility, plus we use Cisco 4500s and Lightstream 20/20s as our
routing hardware.
I am planning on setting up a few BSDI 2.0.1 boxes this week, and would be most
appreciative of any info on security holes therewithin..
Anyone know a good clean root hack on BSDI?
How about a shadow passwd read?
We run Smail on our Sparcs, but I think we'll be using sendmail on the BSDIs.
John
kludge@passport.ca