lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030407201316.GA6978@eiv.com>
From: smcmahon at eiv.com (Shawn McMahon)
Subject: U.S. military helps fund Calgary hacker with $2.3 million

On Mon, Apr 07, 2003 at 01:48:54PM -0400, David Vasil said:
> 
> "Only one remote hole in the default install, in more than 7 years!"
> 
> and extended it beyond the scope of a "default install" to all
> software the openbsd project develops.

Yes, but it was always disingenuous to not include OpenSSH as "default
install".  I mean, unless it was intended that only systems that were
not remotely accessible in any way counted as "default install", in
which case the security claim was essentially useless.


-- 
Shawn McMahon     | Let every nation know, whether it wishes us well or ill,
EIV Consulting    | that we shall pay any price, bear any burden, meet any
UNIX and Linux	  | hardship, support any friend, oppose any foe, to assure
http://www.eiv.com| the survival and the success of liberty. - JFK
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030407/c1c74841/attachment.bin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ