summaryrefslogtreecommitdiffstats
path: root/gnu
diff options
context:
space:
mode:
authorpst <pst@FreeBSD.org>1996-11-22 08:59:07 +0000
committerpst <pst@FreeBSD.org>1996-11-22 08:59:07 +0000
commitf802c9787d3218fbc623bb2a74f3c5c430094dfb (patch)
treee65ab53e32993fd712bc0e7f930d9ff6916114c6 /gnu
parenta8c2478d1d280d99d12fc655de3f105d17d8da42 (diff)
downloadFreeBSD-src-f802c9787d3218fbc623bb2a74f3c5c430094dfb.zip
FreeBSD-src-f802c9787d3218fbc623bb2a74f3c5c430094dfb.tar.gz
Back out recent security patch for rexecd. After more careful analysis,
it is both uneeded and breaks certain lock-step timing in the rexec protocol. Yes, an attacker can "relay" connections using this trick, but a properly configured firewall that would make this sort of subterfuge necessary in the first place (instead of direct packet spoofing) would also thwart useful attacks based on this.
Diffstat (limited to 'gnu')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud