The bugfeature of identd is known (since 1996): anyone can connect to production service on host running identd and query owner of remote side socket. This can be used by bad guy to find objects to attack; i.e. nmap scanner uses it.
Responsible Changed From-To: freebsd-bugs->green Brian wrote the getcred stuff - if it looks good to him I can review/commit this.
State Changed From-To: open->suspended Since this PR was submitted, uipc_socket2.c has been completely refactored. However, it seems that the patches were never applied. Since the assignee is inactive, go ahead and reset the assignment and mark it as suspended. Hat: bugmeister
Responsible Changed From-To: green->freebsd-bugs
Responsible Changed From-To: freebsd-bugs->freebsd-net This sounds more NET related, reassign.
State Changed From-To: suspended->feedback Need feedback.
Responsible Changed From-To: freebsd-net->kmacy Need to confirm that this issue still applies.
State Changed From-To: feedback->open feedback received
Responsible Changed From-To: kmacy->freebsd-net kmacy has asked for all of his PRs to be reassigned back to the pool.
For bugs matching the following criteria: Status: In Progress Changed: (is less than) 2014-06-01 Reset to default assignee and clear in-progress tags. Mail being skipped
Keyword: patch or patch-ready – in lieu of summary line prefix: [patch] * bulk change for the keyword * summary lines may be edited manually (not in bulk). Keyword descriptions and search interface: <https://bugs.freebsd.org/bugzilla/describekeywords.cgi>