Le 20/12/10 03:20, Grant Olson a écrit :
> On 12/19/10 8:03 PM, oli...@first.in-berlin.de wrote:
>> Why not just updateing the machine, or if no updates are available, just 
>> eremove exim?!
>>
> If a machine has been compromised, or even if you suspect it has, you
> can't trust anything about it anymore.
>
> Someone could have used the exim exploit to install a rootkit, a version
> of sshd with a backdoor, etc.  And sure, maybe you can take the sha of
> sshd and compare it to a known source, but maybe sha256 has been
> replaced with a version that tricks you.
>
> So you patch exim, think you're good, and they come back to your machine
> six months later.
>
> You have to rebuild from scratch.
Including a BIOS update ...

Cheers,
Christophe


-- 
Christophe Raffalli
Universite de Savoie
Batiment Le Chablais, bureau 21
73376 Le Bourget-du-Lac Cedex

tel: (33) 4 79 75 81 03
fax: (33) 4 79 75 87 42
mail: christophe.raffa...@univ-savoie.fr
www: http://www.lama.univ-savoie.fr/~RAFFALLI
---------------------------------------------
IMPORTANT: this mail is signed using PGP/MIME
At least Enigmail/Mozilla, mutt or evolution 
can check this signature. The public key is
stored on www.keyserver.net
---------------------------------------------

<<attachment: Christophe_Raffalli.vcf>>

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Caml-list mailing list. Subscription management:
http://yquem.inria.fr/cgi-bin/mailman/listinfo/caml-list
Archives: http://caml.inria.fr
Beginner's list: http://groups.yahoo.com/group/ocaml_beginners
Bug reports: http://caml.inria.fr/bin/caml-bugs

Reply via email to