Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 Jan 2001 20:32:00 -0800 (PST)
From:      Thomas Cannon <root@noops.org>
To:        Marc Rassbach <marc@milestonerdl.com>
Cc:        Chris Johnson <cjohnson@palomine.net>, Matt Dillon <dillon@earth.backplane.com>, Przemyslaw Frasunek <venglin@freebsd.lublin.pl>, freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory: FreeBSD-SA-01:18.bind
Message-ID:  <Pine.BSF.4.21.0101312024580.58309-100000@sonar.noops.org>
In-Reply-To: <Pine.BSF.4.21.9601312115260.35729-100000@tandem.milestonerdl.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> 
> Have you done some DNA test and found that Dan Bernstein is not human and
> therefore unable to make mistakes?
> 

I think the fact that he puts his own money on the fact that there are no
exploitable flaws in qmail or his DNS implementation shows an obvious
commitment to proactive security. I'm sure that is all that was
implied. I've a feeling the ISC isn't sending anyone a check for the bind
exploit just posted to bugtraq from nobody@replay.com, or to NAI
labs. It's sorta like OpenBSD -- sure, mistakes happen. They just make a
hell of a lot less of them because it's part of what they are trying to
achieve.

Thomas








To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0101312024580.58309-100000>