[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200401192336.i0JNaBLd008611@turing-police.cc.vt.edu>
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: Fix the broken windows by building a wall PLUS a question on encrypted file systems
On Mon, 19 Jan 2004 09:28:05 PST, Daniel Sichel <daniels@...derosatel.com> said:
> I usually don't take sides in religious wars, but as an observation, at
> my last job I put up a Linux based DNS and mail server unfirewalled.
> Within 3 days, it was streaming porn for some guy in Brazil. I replaced
> it with an Open BSD server, which I created with almost no knowledge of
> Bind, qmail or Open BSD, and it is still up today, three years later,
> unmolested. So, there is something to be said for secure OSes.
Is it secure, or is it lack of market share?
The people who are hacking into a box to set up a streaming porn server
want the biggest bang for their buck. All you've proven was that 3 days
after you set up the Linux box, some scanner with a working Linux payload
poked you, and that so far you haven't been visited by somebody who
had an OpenBSD version of an exploit.
And let's face it, if there's a vulnerability in BIND or Apache or something
like that, you're a hell of a lot better off getting a Linux exploit if all you're
looking for is raw numbers of sites. There aren't enough OpenBSD sites to
make much of an incremental difference.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040119/2d6afef7/attachment.bin
Powered by blists - more mailing lists