lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E8A3392724A75849B7FA030CAF41A748950D8B@amserv0.affinity-mortgage.com>
From: rahnemann at affinity-mortgage.com (Robert Ahnemann)
Subject: No Subject (re: openssh exploit code?)

> Hi Robert,
> 
> --- Robert Ahnemann <rahnemann@...inity-mortgage.com>
> wrote:
> > I flip to the local radar and get some sort of proof
> > that there might be
> > a thunderstorm coming.  Talk is cheap (as was said),
> > so its up to the
> > admin to verify if A) there is a real threat B) the
> > threat applies to
> > your systems C) the threat damage is worth the
> > damage of 'unscheduled
> > downtime'
> >
> > (for the analogy challenged:  radar = some sort of
> > proof of concept or
> > something of the likes)
> 
> But would you flip to the radar if the local TV
> Weatherman told you to seek shelter and bring the kids
> in?  I'd go get the kids first.  CERT being the
> weatherman in this case..
> 
> Cheers,
> Matt

Comparing a random subscriber on a full-disclosure list and CERT is
somewhat of a bad comparison, no?


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ