lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3F902BC7.8956.1976AB@localhost>
From: bschnzl at cotse.net (Bill Scherr IV, GSEC, GCIA)
Subject: Strange netcat behavior

Netcat worx on more than httpd.  (for instance, oh... everything!) 
Therefore RFC 2616 and all other http RFCs are irrelavent.

Now drop it!

B.

On 17 Oct 2003, this text appeared purporting to belong to thalm

Subject:        	RE: [Full-Disclosure] Strange netcat behavior
From:           	"thalm" <thalm@...cabo.pt>
To:             	<allan.vanleeuwen@...ngemail.nl>
Date sent:      	Fri, 17 Oct 2003 15:11:44 +0100

> Yes, that is correct.
> But my point is why does netcat defaults to a LF behavior (don't 
know if there is the
> option of sending CRLF instead of LF) and telnet defaults defaults 
to CRLF ?
> 
> netcat is very much used to "talk" to HTTP servers. So why does 
netcat does not use
> by default CRLF ? Again, this breaks HTTP RFC rules concerning 
HTTP server and HTTP
> client behavior...



Bill Scherr IV, GSEC, GCIA
EWA / Information & Infrastructure Technologies
National Guard Regional Technology Center / Norwich Campus
Northfield, VT  05663
802-485-1962


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ