well, you make sense to me.

2c from an end-user.

martin f krafft wrote:

> dear list,
> 
> look, i am really not here to start a flame war and heck no, i don't
> want one. please excuse if my behaviour has been leading you onto this
> belief (or maybe not). i am simply failing to grasp the arguments laid
> out by wichert. that is, i don't disagree with him per se, but i have
> the feeling that i am also not being understood. so, please read this
> last attempt to clarify and then either respond, or give me a straight
> "shut up" and i will. and i apologize up front to sven for posting
> parts of his personal reply to the list.
> 
> also sprach Sven Hoexter <[EMAIL PROTECTED]> [2002.04.02.2240 +0200]:
> 
>>Calm down :) It's "just" a DoS attack and if you use a Software you as
>>the admin should look at the normal flood of information and pick out what
>>you need. If you do so you know the problem and you can work around it in
>>different ways. One way is the Deny directiv or some of the Ulimit options
>>introduced into proftpd after the problem occured the first time.
>>In the Debian way the deny directiv is the working one.
>>
> 
> well, i am calm, but i disagree. sure, it boils down to the question
> who debian's audience are, but for all i am concerned, debian's
> reputation _used_ to include "security", and the reason why i'd (as in
> "would" and "had") install(ed) debian was because i didn't need to be
> worrying about the obvious and hence i could spend my resources on
> other things. had i wanted to patch one-year-old bugs in software that
> installs from the "security archives", then i might have just chosen
> to "fly" redhat. i don't understand why you aren't understanding this.
> i am not at all against finding the real bug as well as investigating
> why:
> 
> 
>>their is a patch that doesn't work and it seems like nobody proved
>>the patch after it was applied for the first time.
>>
> 
> but give me at least one argument why these acts cannot combine with
> a *temporary* fix uploaded to the so-called "security archives".
> 
> 
>>With this I'm falling back to another topic: Is the way of keeping
>>exploit code behind bars realy good for the admin without the
>>special coding skills or just new stones in the proccess of running
>>a secure server?
>>
> 
> exactly my point. debian's the "hacker OS", but it's also damn good.
> so why not take little steps such as this and keep it that way even
> for the ones that don't spend 20 hours a day in front of a computer
> and know assembler backwards...
> 
> 
>>Just my personal thoughts about your flames with Wichert.
>>
> 
> they really weren't intended to be flames. i am sorry if they felt
> that way. i am really just trying to be concise since i don't have
> much more to say than i did.
> 
> 


-- 
Chris Massam <[EMAIL PROTECTED]>
YellowTuna Networks Ltd
PO Box 91493, A.M.S.C., Auckland, NZ
Level 2, 272 Parnell Road, Parnell
Tel. +64 9 3077844  Fax. +64 9 3077846
Cel(NZ).  +64 21 2220564 http://www.yellowtuna.co.nz



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to