lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.44.0304072235050.7985-100000@netcore.fi>
From: pekkas at netcore.fi (Pekka Savola)
Subject: U.S. military helps fund Calgary hacker with
 $2.3 million

On Mon, 7 Apr 2003, Blue Boar wrote:
> I'd be willing to give Theo the benefit of the doubt 
> that the author misunderstood the "Only one remote hole in the default 
> install, in more than 7 years!" claim of the OpenBSD team.  Unless you 
> think that claim is also untrue.

That claim is certainly untrue.

If you take a default install from 7 years back, you certainly have more
remote holes, in services that have since been removed from the default
install -- looking 7 years back from *current* default install, not
default install *7 years back*.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ