>>>>> "Arvind" == rarvind  <Arvind> writes:

    Arvind> | Ouch! Downloaded and verified. It is true - the trojaned
    Arvind> version connects | to 203.62.158.32 port 6667 and waits
    Arvind> for a 1 character command - if it is | 'D', then it spawns
    Arvind> /bin/sh on the socket (effectively, reading shell |
    Arvind> commands from the network).

    Arvind> hmmmm.......  i tried an nmap on my local system, it says
    Arvind> openssh connects to port 22.  how did u manage to find out
    Arvind> all those details you have mentioned above ?  cant see any
    Arvind> such info in the openssh faq at their website.

1.  This happens only during compilation of the software from source.

2.  It only happens if you're compiling the source which you
downloaded from ftp.openbsd.org or a mirror between June 30 and August
1 (approximately).

3.  You don't have to run a program to know what it's doing.  Any
programmer worth his/her salt will be able to look at the source code
of a reasonably-sized program and tell you (in varying levels of
detail) how the program works and what it's doing.

Regards,

-- Raju
-- 
Raju Mathur          [EMAIL PROTECTED]           http://kandalaya.org/
                     It is the mind that moves


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to