Cool, these patches apply cleanly to MIT krb5 v1.2.2's telnetd.

The only place that's still left doing a bad thing with netobug/nfrontp
is a section of code ifdef'ed so only CRAY2 and/or UNICOS systems use it.

Thanks,

Nico


On Tue, Jul 24, 2001 at 06:11:58PM -0500, Jacques A. Vidrine wrote:
> On Tue, Jul 24, 2001 at 02:24:44PM -0700, John Rudd wrote:
> > 
> > 
> > So, most of my machines don't use the standard vendor telnet, but
> > instead use one form or another of a kerberized telnet.  Does anyone
> > know if today's announcement applies to kerberized telnetd's?
> > 
> > http://www.securityfocus.com/bid/3064
> 
> Yes, it does.  You can find patches in the FreeBSD port.
> <URL:http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/krb5/files>
> 
> Cheers,
> -- 
> Jacques Vidrine / [EMAIL PROTECTED] / [EMAIL PROTECTED] / [EMAIL PROTECTED]
--
. 
-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant permission to distribute-
-and copy this message.-

Visit our website at http://www.ubswarburg.com

This message contains confidential information and is intended only 
for the individual named.  If you are not the named addressee you 
should not disseminate, distribute or copy this e-mail.  Please 
notify the sender immediately by e-mail if you have received this 
e-mail by mistake and delete this e-mail from your system.

E-mail transmission cannot be guaranteed to be secure or error-free 
as information could be intercepted, corrupted, lost, destroyed, 
arrive late or incomplete, or contain viruses.  The sender therefore 
does not accept liability for any errors or omissions in the contents 
of this message which arise as a result of e-mail transmission.  If 
verification is required please request a hard-copy version.  This 
message is provided for informational purposes and should not be 
construed as a solicitation or offer to buy or sell any securities or 
related financial instruments.

Reply via email to