From owner-man-jp-reviewer@jp.freebsd.org  Tue Aug  4 10:32:27 1998
Received: (from daemon@localhost)
	by jaz.jp.freebsd.org (8.8.8+3.0Wbeta13/8.7.3) id KAA03197;
	Tue, 4 Aug 1998 10:32:27 +0900 (JST)
	(envelope-from owner-man-jp-reviewer@jp.FreeBSD.org)
Received: from hitiij.hitachi.co.jp (root@hitiij.hitachi.co.jp [133.145.224.3])
	by jaz.jp.freebsd.org (8.8.8+3.0Wbeta13/8.7.3) with ESMTP id KAA03189
	for <man-jp-reviewer@jp.freebsd.org>; Tue, 4 Aug 1998 10:32:25 +0900 (JST)
	(envelope-from horikawa@ebina.hitachi.co.jp)
Received: from newton.ebina.hitachi.co.jp by hitiij.hitachi.co.jp (8.8.8+2.7Wbeta7/3.6W-hitiij) id KAA09653; Tue, 4 Aug 1998 10:26:29 +0900 (JST)
Received: from neunman.ebina.hitachi.co.jp by newton.ebina.hitachi.co.jp (8.7.5/3.4W-EBINA) id KAA28767 for <man-jp-reviewer@jp.freebsd.org>; Tue, 4 Aug 1998 10:32:18 +0900 (JST)
Received: from localhost by neunman.ebina.hitachi.co.jp (8.6.12+2.5Wb7/3.4W-EBINA-local) id KAA26625 for <man-jp-reviewer@jp.freebsd.org>; Tue, 4 Aug 1998 10:35:24 +0900
To: man-jp-reviewer@jp.freebsd.org
In-Reply-To: Your message of "Tue, 4 Aug 1998 02:20:26 +0900 (JST)"
	<199808031720.CAA00909@hiloshi.seikyou.ne.jp>
References: <199808031720.CAA00909@hiloshi.seikyou.ne.jp>
X-Mailer: Mew version 1.92.4 on Emacs 19.34 / Mule 2.3 (SUETSUMUHANA)
Mime-Version: 1.0
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit
Message-Id: <19980804103201K.horikawa@ebina.hitachi.co.jp>
Date: Tue, 04 Aug 1998 10:32:01 +0900 (JST)
From: Kazuo Horikawa <horikawa@ebina.hitachi.co.jp>
X-Dispatcher: imput version 980522
Lines: 25
Reply-To: man-jp-reviewer@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+980729
X-Sequence: man-jp-reviewer 358
Subject: [man-jp-reviewer 358] Re: (check) skey.access.5
Errors-To: owner-man-jp-reviewer@jp.freebsd.org
Sender: owner-man-jp-reviewer@jp.freebsd.org

 $BKY@n$G$9!#(B

$B6bED9@;J$5$s!'(B
> $B;O$a$^$7$F!"6b$sED$H?=$7$^$9!#(B
> $B:rF|F~$j$?$F$N%R%^3X@8$G$9!#(B
> $B:#8e$h$m$7$/$*4j$$$7$^$9!#(Bm(_ _)m
 $B$h$m$7$/$*$M$,$$$7$^$9!#(B

> $B0J2<$N$h$&$KFI$a$^$7$?$,!"$$$+$,$G$7$g$&$+!#(B

> > [man-jp-reviewer 356]: $BKY@n(B $B$5$s(B
> > -$B?/F~<T$O<+J,$N%$%s%?%U%'!<%9$r?.Mj$5$l$F$$$k%M%C%H%o!<%/$K@\B3$7!"(B
> > +$B?/F~<T$O<+J,$N%$%s%?%U%'!<%9$r?.Mj$5$l$F$$$k%M%C%H%o!<%/$H$7$F9=@.$7!"(B
> $B?/F~<T$O?.Mj$5$l$F$$$k%M%C%H%o!<%/Fb$N%"%I%l%9$X%m!<%+%k%$%s%?%U%'!<%9(B
> $B$r9=@.$7!"(B
 $B86J8$,(B
An intruder configures a local interface to an address in a trusted
network and connects to the victim using that source address.
$B$J$N$G!"$*$C$7$c$kDL$j$G$9$M!#(B

> >  $B$=$N%=!<%9%"%I%l%9$r;HMQ$7$F!"Ho32<T$K@\B3$7$^$9!#(B

 $B>e5-$N$h$&$KD>$7$^$9!#(B
--
$BKY@nOBM:(B
