lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.43.0402170041310.4090-100000@tundra.winternet.com>
From: dufresne at winternet.com (Ron DuFresne)
Subject: New Security News Website

On Tue, 17 Feb 2004, Benjamin Meade wrote:

> g0d wrote:
> > while having a test box out there 'in the wild'
> > accumulating data on currently-employed techniques for cracking hosts,
> > methinks that functionality would be better suited to a separate host.
>
> It is entirely possible that this functionality *is* on a separate host, but
> this is beside the point. The point being made that open ports do not
> necessarily constitute insecurity.
>

The other point being made is that this system is already going to attract
a significant ammount of attention.  Open ports. whther proxied to some
sense of security or not, is going to attract a tad bit more attnetion in
and of itself.  That and the fact that mailing list software tends to
present it's own set of administrative issues, with which errors are easy
to surface and likely be exploited.  Added services only hieghten the
potential.  There is the possibility this system might well attract more
attention then was assumed/wanted/warranted.

Thanks,

Ron DuFresne
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
	***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ