lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <e6202356506dc5e0408b87196a22b73d@f-box.org> Date: Fri Jul 22 14:08:14 2005 From: dan at f-box.org (Daniel Bartlett) Subject: apache.org files are infected? I cannot reproduce it either:- dan@...ebox ~ $ wget http://www.apache.org/dist/apr/apr-1.0.1.tar.gz --14:02:22--? http://www.apache.org/dist/apr/apr-1.0.1.tar.gz ?????????? => `apr-1.0.1.tar.gz' Resolving www.apache.org... 192.87.106.226 Connecting to www.apache.org[192.87.106.226]:80... connected. HTTP request sent, awaiting response... 200 OK Length: 1,058,637 [application/x-gzip] 100%[====================================>] 1,058,637??? 526.41K/s???????????? 14:02:24 (524.99 KB/s) - `apr-1.0.1.tar.gz' saved [1,058,637/1,058,637] dan@...ebox ~ $ md5sum apr-1.0.1.tar.gz | cut -d ' ' -f 1 0a3cb911ea1823cfa3e5863892774705 dan@...ebox ~ $ wget -o /dev/null -O - http://www.apache.org/dist/apr/apr-1.0.1.tar.gz.md5 | cut -d ' ' -f 2- | sed "s/ //g" 0A3CB911EA1823CFA3E5863892774705 I think you got a bung download. Dan. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050722/27104b85/attachment.html
Powered by blists - more mailing lists