From owner-freebsd-hackers Tue Feb 6 00:13:33 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id AAA07265 for hackers-outgoing; Tue, 6 Feb 1996 00:13:33 -0800 (PST) Received: from genesis.atrad.adelaide.edu.au (genesis.atrad.adelaide.edu.au [129.127.96.120]) by freefall.freebsd.org (8.7.3/8.7.3) with ESMTP id AAA07248 Tue, 6 Feb 1996 00:13:25 -0800 (PST) Received: from msmith@localhost by genesis.atrad.adelaide.edu.au (8.6.12/8.6.9) id SAA02468; Tue, 6 Feb 1996 18:39:27 +1030 From: Michael Smith Message-Id: <199602060809.SAA02468@genesis.atrad.adelaide.edu.au> Subject: Re: Is this security hole being fixed?? To: michael@memra.com (Michael Dillon) Date: Tue, 6 Feb 1996 18:39:27 +1030 (CST) Cc: freebsd-hackers@FreeBSD.org, security@FreeBSD.org In-Reply-To: from "Michael Dillon" at Feb 5, 96 10:46:57 pm MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@FreeBSD.org Precedence: bulk Michael Dillon stands accused of saying: > From: Alan Cox > To: Multiple recipients of list BIG-LINUX > Subject: Linux as a production system > > [ irrelevant details deleted ] > > Some of the other things are very questionable. I can break a standard > Sun Solaris 2 machine in about 2 minutes from a shell prompt and about 10 > otherwise unless the user is applying patchkits very fast. Currently I can > break almost any BSD derived system because of a bug CERT haven't yet > even published. Alan's good at this sort of bragging, in my (limited) experience. Unless he's willing to expose his techniques to scrutiny, I'm happy to scoff. -- ]] Mike Smith, Software Engineer msmith@atrad.adelaide.edu.au [[ ]] Genesis Software genesis@atrad.adelaide.edu.au [[ ]] High-speed data acquisition and (GSM mobile) 0411-222-496 [[ ]] realtime instrument control (ph/fax) +61-8-267-3039 [[ ]] "wherever you go, there you are" - Buckaroo Banzai [[