In the html, there is a reference to an easter egg: <!-- Here's the WideOpenBSD.ORG easter egg $ dig quote.wideopenbsd.org txt -->
The output is (thanks B for the output, meant to reply to the list originally): ; <<>> DiG 9.2.2 <<>> quote.wideopenbsd.org txt ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41571 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2 ;; QUESTION SECTION: ;quote.wideopenbsd.org. IN TXT ;; ANSWER SECTION: quote.wideopenbsd.org. 3600 IN TXT "[xxx] goddamn I love openssh [xxx] it never takes more than 2-6 lines to turn the client into an exploit" ;; AUTHORITY SECTION: wideopenbsd.org. 2005 IN NS ns14.zoneedit.com. wideopenbsd.org. 2005 IN NS ns15.zoneedit.com. ;; ADDITIONAL SECTION: ns14.zoneedit.com. 119162 IN A 209.126.137.108 ns15.zoneedit.com. 134976 IN A 69.10.134.195 ;; Query time: 301 msec ;; SERVER: 10.0.0.1#53(10.0.0.1) ;; WHEN: Mon Mar 6 10:39:00 2006 ;; MSG SIZE rcvd: 238 Am I missing something? Was expecting to find an openssh/openbsd exploit since he touts how numerous/easy they are. Axton Grams On 3/6/06, Bryan Brake <[EMAIL PROTECTED]> wrote: > Bryan Irvine wrote: > > For a laugh go here. > > > > http://wideopenbsd.org/ > > > > How much does it cost to register a domain these > days? Is it registered to Dave Feustel? The > author of the site appears to go above and beyond > to spread FUD... I mean, he uses HTML and even > has an image. > > <sarcasm>I think he's serious folks</sarcasm> > > Bryan Brake

