Date: Wed, 31 Jan 2001 20:32:00 -0800 (PST) From: Thomas Cannon <root@noops.org> To: Marc Rassbach <marc@milestonerdl.com> Cc: Chris Johnson <cjohnson@palomine.net>, Matt Dillon <dillon@earth.backplane.com>, Przemyslaw Frasunek <venglin@freebsd.lublin.pl>, freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-01:18.bind Message-ID: <Pine.BSF.4.21.0101312024580.58309-100000@sonar.noops.org> In-Reply-To: <Pine.BSF.4.21.9601312115260.35729-100000@tandem.milestonerdl.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> > Have you done some DNA test and found that Dan Bernstein is not human and > therefore unable to make mistakes? > I think the fact that he puts his own money on the fact that there are no exploitable flaws in qmail or his DNS implementation shows an obvious commitment to proactive security. I'm sure that is all that was implied. I've a feeling the ISC isn't sending anyone a check for the bind exploit just posted to bugtraq from nobody@replay.com, or to NAI labs. It's sorta like OpenBSD -- sure, mistakes happen. They just make a hell of a lot less of them because it's part of what they are trying to achieve. Thomas To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0101312024580.58309-100000>