From owner-doc-jp@jp.freebsd.org  Sat Jan 27 15:50:11 2001
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id PAA16756;
	Sat, 27 Jan 2001 15:50:11 +0900 (JST)
	(envelope-from owner-doc-jp@jp.FreeBSD.org)
Received: from gion.kyoto-wu.ac.jp (gion.kyoto-wu.ac.jp [202.255.229.101])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id PAA16751
	for <doc-jp@jp.freebsd.org>; Sat, 27 Jan 2001 15:50:11 +0900 (JST)
	(envelope-from miyasita@kyoto-wu.ac.jp)
Received: from uji.kyoto-wu.ac.jp (uji.kyoto-wu.ac.jp [192.168.110.100])
	by gion.kyoto-wu.ac.jp (8.9.3/3.7W) with ESMTP id PAA10135
	for <doc-jp@jp.freebsd.org>; Sat, 27 Jan 2001 15:49:40 +0900 (JST)
Received: from blue.kyoto-wu.ac.jp (localhost [127.0.0.1])
	by uji.kyoto-wu.ac.jp (8.9.3/3.7W) with ESMTP id PAA15579
	for <doc-jp@jp.freebsd.org>; Sat, 27 Jan 2001 15:49:40 +0900 (JST)
Received: from blue.kyoto-wu.ac.jp (localhost [127.0.0.1])
	by blue.kyoto-wu.ac.jp (8.9.3/3.7W-09/11/00) with ESMTP id PAA53332
	for <doc-jp@jp.freebsd.org>; Sat, 27 Jan 2001 15:49:39 +0900 (JST)
Message-Id: <200101270649.PAA53332@blue.kyoto-wu.ac.jp>
To: doc-jp@jp.freebsd.org
In-reply-to: Hiroki Sato's message of "Sat, 27 Jan 2001 15:12:45 JST"
References: <20010123210823.349E837B402@hub.freebsd.org>
	<20010127.151245.71082207.hrs@eos.ocn.ne.jp>
Date: Sat, 27 Jan 2001 15:49:39 +0900
From: MIYASHITA kensuke (=?ISO-2022-JP?B?GyRCNVwyPDdySmUbKEI=?=)
    <miyasita@kyoto-wu.ac.jp>
Reply-To: doc-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+000315
X-Sequence: doc-jp 7956
Subject: [doc-jp 7956] Re: ANNOUNCE: FreeBSD Security Advisory: FreeBSD-SA-01:08.ipfw
Errors-To: owner-doc-jp@jp.freebsd.org
Sender: owner-doc-jp@jp.freebsd.org
X-Originator: miyasita@kyoto-wu.ac.jp

$B5\2<!w5~ET=w;RBg$G$9!#(B

$B!y(B Hiroki Sato $B$5$s(B ( doc-jp 7955)$B!'(B
> 01:09 [REVISED])
> 
>  - "keying material" $B$NNI$$Lu8l$O$J$$$G$7$g$&$+(B?
> 
>    | The greatest security vulnerability is the disclosure of crontab
>    | entries owned by other users, which may contain sensitive data such as
>    | keying material (although this would often be publically disclosed
>    | anyway at the time when the crontab job executes, via process
>    | arguments and environment, etc).

http://chiharu.v6.linux.or.jp/pub/Linux/misc/RFC-japanized/rfc2367-ja.txt
$B$G$O!"$:$P$j!V80:`NA!W$HLu$7$F$$$k$h$&$G$9!#(B

http://www.its.bldrdoc.gov/projects/t1glossary2000/_keying_material.html
$B$r8+$k$H!"(B
$B!V(Bkey, code, or authentication information in physical or magnetic form$B!W(B
$B$H$$$&!"$h$j0lHLE*$C$]$$0UL#$,=q$$$F$"$j$^$7$?!#(B
$B$7$+$7$3$l$r(B1$B8l$G8@$&$H$J$k$H!D!"$&$%!"$*Lr$KN)$F$:$9$_$^$;$s!D!#(B
--
$B5\2<7rJe(B  (http://www.cs.kyoto-wu.ac.jp/%7Emiyasita/)
$B5~ET=w;RBg3X8=Be<R2q3XIt(B (phone:075-531-9156/fax:075-531-9124)
