From owner-freebsd-current@FreeBSD.ORG Fri Dec 11 23:24:09 2009 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 51FFC106566B; Fri, 11 Dec 2009 23:24:09 +0000 (UTC) (envelope-from oberman@es.net) Received: from mailgw.es.net (mail2.es.net [IPv6:2001:400:107:1::2]) by mx1.freebsd.org (Postfix) with ESMTP id 35BCB8FC16; Fri, 11 Dec 2009 23:24:09 +0000 (UTC) Received: from ptavv.es.net (ptavv.es.net [IPv6:2001:400:910::29]) by mailgw.es.net (8.14.3/8.14.3) with ESMTP id nBBNNumj005611 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 11 Dec 2009 15:23:56 -0800 Received: from ptavv.es.net (localhost [127.0.0.1]) by ptavv.es.net (Tachyon Server) with ESMTP id 309C21CC09; Fri, 11 Dec 2009 15:23:56 -0800 (PST) To: Matthew Seaman In-reply-to: Your message of "Fri, 11 Dec 2009 08:49:42 GMT." <4B2207A6.7070204@infracaninophile.co.uk> Date: Fri, 11 Dec 2009 15:23:56 -0800 From: "Kevin Oberman" Message-Id: <20091211232356.309C21CC09@ptavv.es.net> X-Proofpoint-Virus-Version: vendor=fsecure engine=1.12.8161:2.4.5, 1.2.40, 4.0.166 definitions=2009-12-11_15:2009-12-11, 2009-12-11, 2009-12-11 signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 ipscore=0 phishscore=0 bulkscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx engine=5.0.0-0908210000 definitions=main-0912110212 Cc: Polytropon , Bill Moran , freebsd-current@freebsd.org, "Sam Fourman Jr." , Anton Shterenlikht , freebsd-questions@freebsd.org Subject: Re: Root exploit for FreeBSD X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Dec 2009 23:24:09 -0000 > Date: Fri, 11 Dec 2009 08:49:42 +0000 > From: Matthew Seaman > Sender: owner-freebsd-current@freebsd.org > > Polytropon wrote: > > On Fri, 11 Dec 2009 01:42:36 -0600, "Sam Fourman Jr." wrote: > >> I have tried looking around and OpenBSD appears to be the undisputed > >> #1 track record in terms of security and FreeBSD is #2 (I didn't count > >> dragonflyBSD) > > > > VMS would be #0, then? :-) > > I dunno. Haven't seen many MS-DOS exploits recently either... I'm sure that there are systems happily running MSDOS, but I bet not too many are networked. I know that there is still a lot of VMS out there and that it has remained a cash cow for HP. It lived on primarily in the banking and financial sector, though I guess the use is dropping since HP recently outsourced support to India and that lead to the retirement of the last of the original VMS developers, Andy Goldstein. Also, the the end of TECO as Andy was responsible for porting it to almost every platform DEC ever sold (RSX, RSTS, VMS, TOPS-10 and TOPS-20, RT-11, and several others) and continued to maintain it until his retirement. (Most readers of this list probably don't even remember TECO.) And, for may years VMS had major network security problems, especially the infamous default DECNET/DECNET account that lead to may compromises and the second major network worm, Worms Against Nuclear Killers. (I won't use the acronym so as not to offend our British readers. I found out about that when the BBC interviewed me about it and I was told that I could not utter the word.) -- R. Kevin Oberman, Network Engineer Energy Sciences Network (ESnet) Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab) E-mail: oberman@es.net Phone: +1 510 486-8634 Key fingerprint:059B 2DDF 031C 9BA3 14A4 EADA 927D EBB3 987B 3751