Return to BSD News archive
Xref: sserve comp.os.linux.development:22650 comp.os.386bsd.development:3043 Path: sserve!newshost.anu.edu.au!harbinger.cc.monash.edu.au!news.mira.net.au!news.netspace.net.au!serval.net.wsu.edu!netnews.nwnet.net!oracle.pnl.gov!osi-east2.es.net!lll-winken.llnl.gov!uwm.edu!news.alpha.net!news.mathworks.com!udel!news.sprintlink.net!pipex!uunet!news.nevada.edu!homesick.cs.unlv.edu!ftlofaro From: ftlofaro@unlv.edu (Frank Lofaro) Newsgroups: comp.os.linux.development,comp.os.386bsd.development Subject: Re: SAMBA and NETWARE mounting Date: 19 Jan 1995 04:56:42 GMT Organization: UNLV Lines: 140 Message-ID: <3fkrea$dct@homesick.cs.unlv.edu> References: <D267uw.Grq@park.uvsc.edu> <D2HtyC.EnD@info.swan.ac.uk> <D2IuBx.Lwo@park.uvsc.edu> NNTP-Posting-Host: big-twist.cs.unlv.edu In article <D2IuBx.Lwo@park.uvsc.edu> Terry Lambert <terry@cs.weber.edu> writes: >iialan@iifeak.swan.ac.uk (Alan Cox) wrote: >> >> In article <D267uw.Grq@park.uvsc.edu> Terry Lambert <terry@cs.weber.edu> writes: >> >That would get you hooked to a server, but it wouldn't let you >> >login (but you could download things from the login directory and >> >CD in unprotected subdirectories that don't require an authenticated >> >login, like the OS2 subdirectory). >> >> This much information is already around. A lot of network snoopers can take >> the simpler Netware protocol requests apart. I got as far as reading/writing >> files, cd and a couple of login bits before it became apparent that waiting >> for Undocumented Netware was easier 8) > > >Well, as far as I know, most of the "sniffer" type network protocol >analyzers have licensed the packet decodes from Novell, and in >getting the thing installed, you've agreed to their license terms, >which include the sublicense terms from Novell. And these explicitly >disallow using the information provided for reverse engineering >things. > Luckily licenses that you don't sign don't hold much legal water (except that outright piracy is of course illegal). And you don't have to say how you got the information and what tools you used.