The bugfeature of identd is known (since 1996): anyone can connect to
production service on host running identd and query owner of remote side
socket. This can be used by bad guy to find objects to attack; i.e. nmap
scanner uses it.
Brian wrote the getcred stuff - if it looks good to him
I can review/commit this.
Since this PR was submitted, uipc_socket2.c has been completely refactored.
However, it seems that the patches were never applied. Since the assignee
is inactive, go ahead and reset the assignment and mark it as suspended.
This sounds more NET related, reassign.
Need to confirm that this issue still applies.
kmacy has asked for all of his PRs to be reassigned back to the pool.
For bugs matching the following criteria:
Status: In Progress Changed: (is less than) 2014-06-01
Reset to default assignee and clear in-progress tags.
Mail being skipped