From owner-freebsd-current@FreeBSD.ORG Thu Dec 10 15:00:04 2009 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 6EAED1065676 for ; Thu, 10 Dec 2009 15:00:04 +0000 (UTC) (envelope-from steve@ibctech.ca) Received: from smtp.ibctech.ca (v6.ibctech.ca [IPv6:2607:f118::b6]) by mx1.freebsd.org (Postfix) with SMTP id DC79C8FC16 for ; Thu, 10 Dec 2009 15:00:03 +0000 (UTC) Received: (qmail 4920 invoked by uid 89); 10 Dec 2009 15:06:56 -0000 Received: from unknown (HELO ?IPv6:2607:f118::5?) (steve@ibctech.ca@2607:f118::5) by 2607:f118::b6 with ESMTPA; 10 Dec 2009 15:06:56 -0000 Message-ID: <4B210CE9.1050709@ibctech.ca> Date: Thu, 10 Dec 2009 09:59:53 -0500 From: Steve Bertrand User-Agent: Thunderbird 2.0.0.17 (Windows/20080914) MIME-Version: 1.0 To: Bill Moran References: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <20091210095122.a164bf95.wmoran@potentialtech.com> In-Reply-To: <20091210095122.a164bf95.wmoran@potentialtech.com> X-Enigmail-Version: 0.96.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: freebsd-current@freebsd.org, Anton Shterenlikht , freebsd-questions@freebsd.org Subject: Re: Root exploit for FreeBSD X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Dec 2009 15:00:04 -0000 Bill Moran wrote: > In response to Anton Shterenlikht : > >> >From my information security manager: >> >> FreeBSD isn't much used within the University (I understand) and has a >> (comparatively) poor security record. Most recently, for example: >> >> http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html > > Are you trying to make your infosec guy look like an idiot? He doesn't really have to _try_, does he? I have always thought that an infosec person should *know* what they have running within their own network, and furthermore, gather his comparative analysis from somewhere other than the dept-of-some-guys-blog. Perhaps these are not the job requirements of a security person. Steve