Subject: re: libwrap (was Re: amd vulnerability: patch for 1.3.3)
To: Brian C. Grayson <bgrayson@marvin.ece.utexas.edu>
From: matthew green <mrg@eterna.com.au>
List: tech-security
Date: 10/18/1999 16:52:42
  by redmail.netbsd.org with SMTP; 18 Oct 1999 06:52:53 -0000
	by splode.eterna.com.au (Postfix) with ESMTP
	id 0FD6D3C88; Mon, 18 Oct 1999 16:52:42 +1000 (EST)
To: "Brian C. Grayson" <bgrayson@marvin.ece.utexas.edu>
Cc: Manuel Bouyer <bouyer@antioche.lip6.fr>,
	tech-security@netbsd.org, itojun@iijlab.net
subject: re: libwrap (was Re: amd vulnerability: patch for 1.3.3) 
in-reply-to: your message of "Mon, 18 Oct 1999 01:48:04 EST."
             <19991018014804.A19607@marvin.ece.utexas.edu> 
organisation: people's front against (bozotic) www (softwar foundation)
x-other-organisation: The NetBSD Foundation.
Date: Mon, 18 Oct 1999 16:52:42 +1000
Message-ID: <16517.940229562@eterna.com.au>
From: matthew green <mrg@eterna.com.au>

   
     Thanks.  It should be feasible to check against both portmap
   and the specific service, via two checks -- "portmap" and
   getrpcbynumber(prog).  Would this be worth coding up?

wouldn't this require hacking each program ?  i'm not saying this
_isn't_ worthwhile (mountd access lists would be nice, eg :-), but
that it is not a localised change ...?