From: eichin@cygnus.com (Mark Eichin)
To: tytso@Athena.MIT.EDU
Message Hash: 0281dedf2b8efb6626d94eb6d5aa56f8c72393ca6bd1a57e716a8efb419a26bf
Message ID: <9303041910.AA28103@cygnus.com>
Reply To: <9303041824.AA26578@SOS>
UTC Datetime: 1993-03-04 19:11:40 UTC
Raw Date: Thu, 4 Mar 93 11:11:40 PST
From: eichin@cygnus.com (Mark Eichin)
Date: Thu, 4 Mar 93 11:11:40 PST
To: tytso@Athena.MIT.EDU
Subject: re: You Aren't [I'm Not]
In-Reply-To: <9303041824.AA26578@SOS>
Message-ID: <9303041910.AA28103@cygnus.com>
MIME-Version: 1.0
Content-Type: text/plain
> i know of several slip/ppp endpoints that aren't password protected. more
> every day, in fact.
>probably clamp down anyway, since presumably they didn't pay good money
>for those resources to give them away free to anyone who can dail up to
I was wondering about that -- I kind of assumed that Peter meant
"real" endpoints that were unprotected because they provided service
that way. For example, UUNET has (had?) a 1-900-GETSRCS (or something
like that) UUCP dialin, the phone company mediated money handling,
uunet didn't care who you were -- but as far as I know it would only
allow file transfer.
Are there any slip/ppp/uucp+rmail points that are "open" that
aren't likely to dry up if they get widely announced? If so, please
announce them!
_Mark_
Return to March 1993
Return to “Theodore Ts’o <tytso@Athena.MIT.EDU>”