Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 11 Dec 2009 12:29:44 +0100
From:      $witch <a.spinella@rfc1925.net>
To:        "Anton Shterenlikht" <mexas@bristol.ac.uk>, freebsd-questions@freebsd.org,  freebsd-current@freebsd.org
Subject:   Re: Root exploit for FreeBSD
Message-ID:  <op.u4rt7sclqr96hw@zeta>
In-Reply-To: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk>
References:  <20091210144141.GB834@mech-cluster241.men.bris.ac.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 10 Dec 2009 15:41:41 +0100, Anton Shterenlikht  
<mexas@bristol.ac.uk> wrote:

>> From my information security manager:
>
> 	FreeBSD isn't much used within the University (I understand) and has a
> 	(comparatively) poor security record. ......
>
>

Hi,

almost all of you remark how FreeBSD is more-secure-than-others-OS, will  
add nothing to varius comments.

but i look in syslogs of some FreeBSD internet server and there is a great  
evidence that some "botnets" are (again) tryng simple combination of  
uid/pwd.

starting from Dec  8 01:00:34 (CET) hundreds of zombies are looking for a  
valid username.

it mean that most of the matter is our; the FreeBSD users.

we are the only ones that will (or will not) patch the systems;

i love the FreeBSD security while it is MOSTLY based on KNOWLEDGE of users  
than on a PERFECT code.

cheers

Alessandro

-- 
"If 386BSD had been available when I started on Linux, Linux would  
probably never had happened." Linus Torvalds



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.u4rt7sclqr96hw>