lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 10 May 2007 10:19:53 -0600
From: Vincent Danen <vdanen@...driva.com>
To: Jeroen Massar <jeroen@...ix.org>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: [ MDKSA-2007:101 ] - Updated bind
 packages	fix vulnerability

* Jeroen Massar <jeroen@...ix.org> [2007-05-10 01:54:20 +0100]:

>Jeroen Massar wrote:
>> security@...driva.com wrote:
>>>  _______________________________________________________________________
>>>
>>>  Mandriva Linux Security Advisory                         MDKSA-2007:101
>>>  http://www.mandriva.com/security/
>>>  _______________________________________________________________________
>>>
>>>  Package : vim
>>>  Date    : May 9, 2007
>>>  Affected: 2007.0, 2007.1
>> 
>> But the subject line reads:
>> 
>> [ MDKSA-2007:101 ] - Updated bind packages fix vulnerability
>> 
>> So is this a spoof or is this a spoof?
>> Or did somebody make a booboo at Mandriva. The PGP key seems to at least
>> check out for the fact that the signature on the part of the message
>> that is signed is correct. As the PGP key is not in the strong set it
>> can't be really trusted of course.

This was a booboo.  The advisory contents are correct, just the subject
line was incorrect.

>Also setting a Reply-To: to a broken xsecurity@...driva.com absolutely
>doesn't make any sense (unless you want to partially overcome the
>problem of vacation messages getting bounced back, but hey those people
>will nicely ignore your Reply-To anyway....)

Over 60% of the out-of-office or undeliverable messages have been
eliminated by doing this.  It's not 100% effective, but I'll take a 60%
reduction anyday.

-- 
Vincent Danen @ http://linsec.ca/

Content of type "application/pgp-signature" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ