From owner-doc-jp@jp.freebsd.org  Mon Jan 29 11:57:34 2001
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id LAA66517;
	Mon, 29 Jan 2001 11:57:34 +0900 (JST)
	(envelope-from owner-doc-jp@jp.FreeBSD.org)
Received: from research.gate.nec.co.jp (research.gate.nec.co.jp [202.247.6.217])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id LAA66512
	for <doc-jp@jp.freebsd.org>; Mon, 29 Jan 2001 11:57:33 +0900 (JST)
	(envelope-from hino@nwk.cl.nec.co.jp)
Received: from leek.nwk.cl.nec.co.jp (IDENT:9fDhWmouWU3/WWnSjxjnmUQDQSIwPrb5@leek.nwk.cl.nec.co.jp [10.56.32.7]) by research.gate.nec.co.jp (8.9.3+3.2W/000323) with ESMTP id LAA22651 for <doc-jp@jp.freebsd.org>; Mon, 29 Jan 2001 11:57:33 +0900 (JST)
Received: from localhost by leek.nwk.cl.nec.co.jp (8.11.0/NWKM20000322) with ESMTP
	id f0T2vXE46010 for <doc-jp@jp.freebsd.org>; Mon, 29 Jan 2001 11:57:33 +0900 (JST)
To: doc-jp@jp.freebsd.org
From: hino@ccm.cl.nec.co.jp
X-In-Reply-To: miyasita@kyoto-wu.ac.jp's message of
	"Sat, 27 Jan 2001 15:49:39 +0900"
In-Reply-To: <200101270649.PAA53332@blue.kyoto-wu.ac.jp>
References: <200101270649.PAA53332@blue.kyoto-wu.ac.jp>
X-Mailer: Mew version 1.93 on Emacs 19.34 / Mule 2.3 (SUETSUMUHANA)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Message-Id: <20010129115732U.hino@nwk.cl.nec.co.jp>
Date: Mon, 29 Jan 2001 11:57:32 +0900
X-Dispatcher: imput version 980905(IM100)
Lines: 21
Reply-To: doc-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+000315
X-Sequence: doc-jp 7959
Subject: [doc-jp 7959] Re: ANNOUNCE: FreeBSD Security Advisory: FreeBSD-SA-01:08.ipfw
Errors-To: owner-doc-jp@jp.freebsd.org
Sender: owner-doc-jp@jp.freebsd.org
X-Originator: hino@nwk.cl.nec.co.jp

>> On Sat, 27 Jan 2001 15:49:39 +0900, MIYASHITA kensuke ($B5\2<7rJe(B) <miyasita@kyoto-wu.ac.jp> said:

:> $B5\2<!w5~ET=w;RBg$G$9!#(B
:> $B!y(B Hiroki Sato $B$5$s(B ( doc-jp 7955)$B!'(B
>> 01:09 [REVISED])
>> 
>> - "keying material" $B$NNI$$Lu8l$O$J$$$G$7$g$&$+(B?
>> 
>> | The greatest security vulnerability is the disclosure of crontab
>> | entries owned by other users, which may contain sensitive data such as
>> | keying material (although this would often be publically disclosed
>> | anyway at the time when the crontab job executes, via process
>> | arguments and environment, etc).

:> http://chiharu.v6.linux.or.jp/pub/Linux/misc/RFC-japanized/rfc2367-ja.txt
:> $B$G$O!"$:$P$j!V80:`NA!W$HLu$7$F$$$k$h$&$G$9!#(B

$B$G$b!"$3$3$G$OC1=c$K!V80(B($BE*$J$b$N(B)$B!W$r;X$7$F$$$F!":`NA$H8@$&0UL#IU$1$O(B
$BL5$$$h$&$K;W$$$^$9!#0l8l$K$9$k$J$i!V80>pJs!W$GNI$$$N$G$O$J$$$G$7$g$&$+!#(B

$BF|Ln(B
