In the html, there is a reference to an easter egg:

<!--
Here's the WideOpenBSD.ORG easter egg
$ dig quote.wideopenbsd.org txt
-->

The output is (thanks B for the output, meant to reply to the list originally):

; <<>> DiG 9.2.2 <<>> quote.wideopenbsd.org txt
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41571
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;quote.wideopenbsd.org.         IN      TXT

;; ANSWER SECTION:
quote.wideopenbsd.org.  3600    IN      TXT     "[xxx] goddamn I love
openssh [xxx] it never takes more than 2-6 lines to turn the client
into an exploit"

;; AUTHORITY SECTION:
wideopenbsd.org.        2005    IN      NS      ns14.zoneedit.com.
wideopenbsd.org.        2005    IN      NS      ns15.zoneedit.com.

;; ADDITIONAL SECTION:
ns14.zoneedit.com.      119162  IN      A       209.126.137.108
ns15.zoneedit.com.      134976  IN      A       69.10.134.195

;; Query time: 301 msec
;; SERVER: 10.0.0.1#53(10.0.0.1)
;; WHEN: Mon Mar  6 10:39:00 2006
;; MSG SIZE  rcvd: 238

Am I missing something?  Was expecting to find an openssh/openbsd
exploit since he touts how numerous/easy they are.

Axton Grams

On 3/6/06, Bryan Brake <[EMAIL PROTECTED]> wrote:
> Bryan Irvine wrote:
> > For a laugh go here.
> >
> > http://wideopenbsd.org/
> >
>
> How much does it cost to register a domain these
> days?  Is it registered to Dave Feustel?  The
> author of the site appears to go above and beyond
> to spread FUD...  I mean, he uses HTML and even
> has an image.
>
> <sarcasm>I think he's serious folks</sarcasm>
>
> Bryan Brake

Reply via email to