On Saturday 12 December 2009 22:44:54 Rolf G Nielsen wrote:
Mario Lobo wrote:
On Saturday 12 December 2009 21:23:00 Rolf Nielsen wrote:
Where's that? The Nvidia site says nothing about it yet, and the
makefile for x11/nvidia-driver still says ONLY_FOR_ARCHS=i386. I'm
eagerly waiting for
Mario Lobo wrote:
On Saturday 12 December 2009 22:44:54 Rolf G Nielsen wrote:
Mario Lobo wrote:
On Saturday 12 December 2009 21:23:00 Rolf Nielsen wrote:
Where's that? The Nvidia site says nothing about it yet, and the
makefile for x11/nvidia-driver still says ONLY_FOR_ARCHS=i386. I'm
eagerly
but i look in syslogs of some FreeBSD internet server and there is a great
evidence that some botnets are (again) tryng simple combination of
uid/pwd.
/usr/ports/security/sshguard-*
randy
___
freebsd-questions@freebsd.org mailing list
On Fri, 11 Dec 2009 13:01:51 -0800, Kurt Buff kurt.b...@gmail.com wrote:
Well, yes, except this assumes one has access to the sysadmin...
Physical access.
It's hard to exploit a sysadmin by social engineering
because he hardly has any friends. :-)
--
Polytropon
Magdeburg, Germany
Happy
2009/12/11 Kevin Oberman ober...@es.net:
Date: Fri, 11 Dec 2009 08:49:42 +
From: Matthew Seaman m.sea...@infracaninophile.co.uk
Sender: owner-freebsd-curr...@freebsd.org
Polytropon wrote:
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com
wrote:
I have tried
On Fri 11 Dec 2009 at 20:59:57 PST Robert Huff wrote:
Ulf Zimmermann writes:
Just go to Fry's Electronic. Most of their systems are still
MS-Dos with Novell for network, running text based
inventory/quote/sales app.
Ca _lot_ of small businesses have something similar.
And why
2009/12/11 Kevin Oberman ober...@es.net:
Date: Fri, 11 Dec 2009 08:49:42 +
From: Matthew Seaman m.sea...@infracaninophile.co.uk
Sender: owner-freebsd-curr...@freebsd.org
Polytropon wrote:
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr.
sfour...@gmail.com wrote:
I have
a
: (comparatively) poor security record. Most recently, for example:
:
:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
:
: Are you trying to make your infosec guy look like an idiot? Does he
: realize that FreeBSD has a grand total of 16 security
Are you sure that OpenBSD has a better record?
I found this for loose reference.
http://en.wikipedia.org/wiki/OpenBSD#Security_and_code_auditing
I will say that even though on the surface OpenBSD appears to have a
better track record security wise
I tend to use FreeBSD for my desktop needs
Sam Fourman Jr. wrote:
Are you sure that OpenBSD has a better record?
I found this for loose reference.
http://en.wikipedia.org/wiki/OpenBSD#Security_and_code_auditing
I will say that even though on the surface OpenBSD appears to have a
better track record security wise
I tend to use FreeBSD
http://www.nvnews.net/vbulletin/showthread.php?t=142120
On Sun, Dec 13, 2009 at 2:23 AM, Rolf Nielsen
listrea...@lazlarlyricon.com wrote:
Sam Fourman Jr. wrote:
Are you sure that OpenBSD has a better record?
I found this for loose reference.
On Saturday 12 December 2009 21:23:00 Rolf Nielsen wrote:
Where's that? The Nvidia site says nothing about it yet, and the
makefile for x11/nvidia-driver still says ONLY_FOR_ARCHS=i386. I'm
eagerly waiting for it, but I can't find anything other than a forum
post (I don't have the address
Mario Lobo wrote:
On Saturday 12 December 2009 21:23:00 Rolf Nielsen wrote:
Where's that? The Nvidia site says nothing about it yet, and the
makefile for x11/nvidia-driver still says ONLY_FOR_ARCHS=i386. I'm
eagerly waiting for it, but I can't find anything other than a forum
post (I don't have
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com
wrote:
I have tried looking around and OpenBSD appears to be the undisputed
#1 track record in terms of security and FreeBSD is #2 (I didn't count
dragonflyBSD)
VMS would be #0, then? :-)
--
Polytropon
Magdeburg,
On Thu, Dec 10, 2009 at 10:34:34PM -0600, Paul Schmehl wrote:
I'm starting to wonder if the security manager really said what Anton
claims he said, or Anton is filtering his perceptions through the anger he
feels at being restricted in his ability to operate freely. If the latter
is the
On Thu, 10 Dec 2009 15:41:41 +0100, Anton Shterenlikht
me...@bristol.ac.uk wrote:
From my information security manager:
FreeBSD isn't much used within the University (I understand) and has a
(comparatively) poor security record. ..
Hi,
almost all of you remark how
At 2009-12-11 11:29:44+, $witch writes:
but i look in syslogs of some FreeBSD internet server and there is a great
evidence that some botnets are (again) tryng simple combination of
uid/pwd.
# always, everywhere:
PasswordAuthentication No
Nick B
On Fri, 11 Dec 2009 12:29:44 +0100, $witch a.spine...@rfc1925.net wrote:
starting from Dec 8 01:00:34 (CET) hundreds of zombies are looking for a
valid username.
For example Administrator... :-)
i love the FreeBSD security while it is MOSTLY based on KNOWLEDGE of users
than on a
Polytropon wrote:
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com
wrote:
I have tried looking around and OpenBSD appears to be the undisputed
#1 track record in terms of security and FreeBSD is #2 (I didn't count
dragonflyBSD)
VMS would be #0, then? :-)
I dunno.
Paul Schmehl writes:
And from I understand it's going to get worse.
Apparently the IT services are drawing up
plans to completely forbid use of non-autorized
OS. I imagine fbsd will not be authorized.
So I'm anticipating another battle already.
Does this extend to computers
$witch a.spine...@rfc1925.net writes:
but i look in syslogs of some FreeBSD internet server and there is a
great evidence that some botnets are (again) tryng simple
combination of uid/pwd.
starting from Dec 8 01:00:34 (CET) hundreds of zombies are looking
for a valid username.
Starting
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dag-Erling Smørgrav wrote:
$witch a.spine...@rfc1925.net writes:
but i look in syslogs of some FreeBSD internet server and there is a
great evidence that some botnets are (again) tryng simple
combination of uid/pwd.
starting from Dec 8
Svein Skogen svein-listm...@stillbilde.net writes:
The easiest way of brute-forcing access to a FreeBSD server includes
locating the sysadmin and applying the common desk drawer. It's that
simple.
*laugh*
I thought you were more of a baseball bat kind of guy :)
DES
--
Dag-Erling Smørgrav -
/item/Root-exploit-for-FreeBSD-873352.html
From
http://www.serverwatch.com/eur/article.php/3850401/FreeBSD-Shines-While-Apple-Fails.htm
All software has bugs, but it's how people react when things go wrong that
you can judge them. Did the FreeBSD folks sit around and do nothing? Did
On Fri, Dec 11, 2009 at 08:49:42AM +, Matthew Seaman wrote:
I dunno. Haven't seen many MS-DOS exploits recently either...
That's true, it would be difficult to find a local privilege escalation
exploit in an operating system without the concept of limited user
accounts :)
--
Mark Shroyer
On Fri, Dec 11, 2009 at 08:49:42AM +, Matthew Seaman wrote:
Polytropon wrote:
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com
wrote:
I have tried looking around and OpenBSD appears to be the undisputed
#1 track record in terms of security and FreeBSD is #2 (I
On Fri, 11 Dec 2009 10:49:50 -0500, Jerry McAllister jerr...@msu.edu wrote:
On Fri, Dec 11, 2009 at 08:49:42AM +, Matthew Seaman wrote:
Polytropon wrote:
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr.
sfour...@gmail.com
wrote:
I have tried looking around and OpenBSD
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dag-Erling Smørgrav wrote:
Svein Skogen svein-listm...@stillbilde.net writes:
The easiest way of brute-forcing access to a FreeBSD server includes
locating the sysadmin and applying the common desk drawer. It's that
simple.
*laugh*
I thought
If memory serves me right, sometime around 10:49am, Jerry McAllister told me:
On Fri, Dec 11, 2009 at 08:49:42AM +, Matthew Seaman wrote:
Polytropon wrote:
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com
wrote:
I have tried looking around and OpenBSD appears to
2009/12/11 Svein Skogen (Listmail Account) svein-listm...@stillbilde.net
The easiest way of brute-forcing access to a FreeBSD server includes
locating the sysadmin and applying the common desk drawer. It's that
simple.
http://xkcd.com/538/
indeed.
On Fri, Dec 11, 2009 at 11:53, J Sisson sisso...@gmail.com wrote:
2009/12/11 Svein Skogen (Listmail Account) svein-listm...@stillbilde.net
The easiest way of brute-forcing access to a FreeBSD server includes
locating the sysadmin and applying the common desk drawer. It's that
simple.
Date: Fri, 11 Dec 2009 08:49:42 +
From: Matthew Seaman m.sea...@infracaninophile.co.uk
Sender: owner-freebsd-curr...@freebsd.org
Polytropon wrote:
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr. sfour...@gmail.com
wrote:
I have tried looking around and OpenBSD appears to be
On Fri, Dec 11, 2009 at 03:23:56PM -0800, Kevin Oberman wrote:
Date: Fri, 11 Dec 2009 08:49:42 +
From: Matthew Seaman m.sea...@infracaninophile.co.uk
Sender: owner-freebsd-curr...@freebsd.org
Polytropon wrote:
On Fri, 11 Dec 2009 01:42:36 -0600, Sam Fourman Jr.
Ulf Zimmermann writes:
Just go to Fry's Electronic. Most of their systems are still
MS-Dos with Novell for network, running text based
inventory/quote/sales app.
Ca _lot_ of small businesses have something similar.
Robert Huff
From my information security manager:
FreeBSD isn't much used within the University (I understand) and has a
(comparatively) poor security record. Most recently, for example:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
--
Anton
/item/Root-exploit-for-FreeBSD-873352.html
Are you trying to make your infosec guy look like an idiot? Does he
realize that FreeBSD has a grand total of 16 security problems for all
of 2009? Hell, Microsoft has that many in an average month.
If he can find something (other than OpenBSD
Anton Shterenlikht wrote:
From my information security manager:
FreeBSD isn't much used within the University (I understand) and has a
(comparatively) poor security record. Most recently, for example:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD
-exploit-for-FreeBSD-873352.html
Some say... world flat... some say roundish. There are lots of
opinions to choose from. It would be nice to see an actual properly
designed study quoted... or even some raw data referenced. and I am
not talking about something vendor sponsored that examines
/security/news/item/Root-exploit-for-FreeBSD-873352.html
Are you trying to make your infosec guy look like an idiot?
He doesn't really have to _try_, does he?
I have always thought that an infosec person should *know* what they
have running within their own network, and furthermore, gather his
Anton Shterenlikht me...@bristol.ac.uk writes:
From my information security manager:
FreeBSD isn't much used within the University (I understand) and has a
(comparatively) poor security record. Most recently, for
example:
comparatively, compared to what? Windows? Linux?
/Root-exploit-for-FreeBSD-873352.html
Wow.
Just...wow.
FreeBSD's security record, the rate at which fixes occur, the ports
system and the overall sanity of the environment is *precisely* why we
have been migrating from RHEL to FreeBSD at my University (I'm
employed by the University
://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
Yes, and?
http://docs.freebsd.org/cgi/getmsg.cgi?fetch=0+0+archive/2009/freebsd-security-notifications/20091206.freebsd-security-notifications
http://security.freebsd.org/advisories/FreeBSD-SA-09:16.rtld.asc
Andreas
:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
___
freebsd-questions@freebsd.org mailing list
http
Anton Shterenlikht wrote:
From my information security manager:
FreeBSD isn't much used within the University (I understand) and has a
(comparatively) poor security record. Most recently, for example:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD
, for example:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
Are you trying to make your infosec guy look like an idiot? Does he
realize that FreeBSD has a grand total of 16 security problems for all
of 2009? Hell, Microsoft has that many
On Thu, Dec 10, 2009 at 5:21 PM, Anton Shterenlikht me...@bristol.ac.uk wrote:
On Thu, Dec 10, 2009 at 09:51:22AM -0500, Bill Moran wrote:
In response to Anton Shterenlikht me...@bristol.ac.uk:
I had to fight a long battle, well.. I had
some support from other academics, to have
a linux
:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.ht
ml
Please pass this to your information security manager:
From one information security manager to another, you're an idiot.
--
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my
much used within the University (I understand) and has a
(comparatively) poor security record. Most recently, for example:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.ht
ml
Please pass this to your information security manager:
From one information security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Chargen wrote:
On Thu, Dec 10, 2009 at 5:21 PM, Anton Shterenlikht me...@bristol.ac.uk
wrote:
On Thu, Dec 10, 2009 at 09:51:22AM -0500, Bill Moran wrote:
In response to Anton Shterenlikht me...@bristol.ac.uk:
I had to fight a long battle,
On Thu, 10 Dec 2009 16:21:50 +
Anton Shterenlikht me...@bristol.ac.uk wrote:
I had to fight a long battle, well.. I had
some support from other academics, to have
a linux class in my Faculty. Here the
opposition wasn't so much security, as
why would any undegraduate need linux,
as if MS
On Thu, Dec 10, 2009 at 10:21 AM, Anton Shterenlikht me...@bristol.ac.ukwrote:
Perhaps I should start putting together
some statistics to make my case more forcefully.
I fought the same battle at the Univ. I attended (as a student). They were
an M$ shop as well and had issues with me running
Fortuantely, I had no problem setting up a black FreeBSD box to
preserve my sanity.
A tip for those threatened with no BSD box at work:
FreeBSD runs fine _inside_ a box that looks like a multi sheet scanner.
OK, slow, but invisible to managers who require MS only.
These scanners often lie
On Thu, 10 Dec 2009 20:21:26 +0100
Julian H. Stacey j...@berklix.com replied:
Fortuantely, I had no problem setting up a black FreeBSD box to
preserve my sanity.
A tip for those threatened with no BSD box at work:
FreeBSD runs fine _inside_ a box that looks like a multi sheet scanner.
OK,
2009/12/10 Anton Shterenlikht me...@bristol.ac.uk:
I was just stressed after being forced by him
to explain why I wanted firewall exceptions
for two ports to my FreeBSD portscluster nodes.
I explained the reasons and that was settled.
Anton, I don't know about the UK, Great Britain or
On Thu, 10 Dec 2009 20:21:26 +0100
Julian H. Stacey j...@berklix.com replied:
Fortuantely, I had no problem setting up a black FreeBSD box to
preserve my sanity.
A tip for those threatened with no BSD box at work:
FreeBSD runs fine _inside_ a box that looks like a multi sheet scanner.
FreeBSD isn't much used within the University (I understand) and has a
(comparatively) poor security record. Most recently, for example:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
Are you trying to make your infosec guy look like
Jerry wrote:
Out of pure morbid curiosity, would you please answer this question for
me.
You work for a corporation that specifically requires the use of
a specific OS, the OS itself is not material to this question. It also
forbids the use of any unauthorized OS or equipment on the
--On December 10, 2009 2:11:31 PM -0600 Kevin Wilcox
kevin.wil...@gmail.com wrote:
2009/12/10 Anton Shterenlikht me...@bristol.ac.uk:
I was just stressed after being forced by him
to explain why I wanted firewall exceptions
for two ports to my FreeBSD portscluster nodes.
I explained the
FreeBSD isn't much used within the University (I understand) and has a
(comparatively) poor security record.
unlike linux or windoze, rofl
randy
___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to
freebsd-questions-unsubscr...@freebsd.org
--
View this message in context:
http://old.nabble.com/Root-exploit-for-FreeBSD-tp26728358p26739505.html
Sent from the freebsd-questions mailing list archive
. Most recently, for example:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
Are you trying to make your infosec guy look like an idiot? Does he
realize that FreeBSD has a grand total of 16 security problems for all
of 2009? Hell, Microsoft has that many
school :-)
and has a
(comparatively) poor security record. Most recently, for example:
http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
as many have explained, connecting a computer
62 matches
Mail list logo