On Fri, 20 Nov 2009 14:37:36 +1100 Aaron Mason wrote: > On Fri, Nov 20, 2009 at 2:06 PM, rhubbell <[email protected]> wrote: > > On Fri, 20 Nov 2009 12:02:51 +1100 > > > > Definitely not missing the point. Maybe you missed mine. Not "worrying" > > because you trust everything about OpenBSD and everyone that's worked > > on it and every package you've installed and every piece of hardware > > you've installed, etc., etc. It's naive to point elsewhere and say > > "see, they're not secure". For example should I trust you and the > > other "tooters" just because you insist OpenBSD's secure? > > > > That's a good point. However a story told on the testimonials page is > a good reason not to take our word for it, because it's been > demonstrated. A redhat server rooted but OpenBSD servers left after
Maybe an OpenBSD tooter was the rooter? > being probed is quite a feat. A P133 w/ 64mb of RAM being floodpinged > by 900 hosts that only got a little slower from it is also a > considerable achievement. Agreed. > > > > > How would you know if you've been compromised? If it's the crown > > jewels it may be worth it to remain undetected, right? Saying it's not > > possible to avoid detection is naive. > > > > Usually when a machine is compromised, it is then used to attack other How much is an exploit worth? If you're going to reveal the fact you've compromised a system, it's not worth that much. > sites - that would be detected. A large sudden data transfer from a > machine with the company's crown jewels on it would be a pretty good > indicator as well. If the log files are sent offsite - a very wise > move I believe - they could contain traces of the attack as well. I'm > not naive though - you would actually have to be watching these, and > if you're not, today's a good day to start. > > Hope this helps. > > > -- > Aaron Mason - Programmer, open source addict > I've taken my software vows - for beta or for worse

