[17561] in bugtraq
Re: OpenBSD Exploit
daemon@ATHENA.MIT.EDU (cripto)
Wed Nov 8 15:13:43 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id: <20001107094400.A12122@subterrain.net>
Date: Tue, 7 Nov 2000 09:44:00 -0800
Reply-To: cripto <cripto@SUBTERRAIN.NET>
From: cripto <cripto@SUBTERRAIN.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <001501c04702$54ee3d60$4063abd0@bob>; from rloxley@HACKPHREAK.ORG
on Sun, Nov 05, 2000 at 03:28:09AM -0500
This post was fake. The guys in SSG are dissapointed that they are a target
for childish defamatory pranks. We do not know the individual who posted this
"OpenBSD exploit"; and had no knowledge of it until we saw it on Bugtraq along
with the rest of the world. A quick look at the WHOIS database demonstrates
that the source of the email is not the MX for the particular domain in the
From: field.
-cripto