lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031013164316.GA11901@eiv.com> From: smcmahon at eiv.com (Shawn McMahon) Subject: openssh exploit code? On Mon, Oct 13, 2003 at 12:13:14AM -0700, security snot said: > > probably enjoy the multiple levels of admitted "obscurity features" (check > the Brad Spengler vs. OpenBSD Team threads just about anywhere, Theo's > quotes on w^x being an "obscurity feature" to thwart attacks from lesser > skilled attackers - since after all, the lesser skilled attackers are the > real threat, right?). Do you leave your car door unlocked and the keys in it? Because, after all, locking the door and taking the keys with you only stops the lesser skilled attackers. -- Shawn McMahon | Let every nation know, whether it wishes us well or ill, EIV Consulting | that we shall pay any price, bear any burden, meet any UNIX and Linux | hardship, support any friend, oppose any foe, to assure http://www.eiv.com| the survival and the success of liberty. - JFK -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20031013/9730d5a6/attachment.bin
Powered by blists - more mailing lists