Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 May 2000 10:21:22 -0600 (MDT)
From:      Paul Hart <hart@iserver.com>
To:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: envy.vuurwerk.nl daily run output
Message-ID:  <Pine.BSF.4.21.0005111014310.8386-100000@anchovy.orem.iserver.com>
In-Reply-To: <200005111611.MAA17380@khavrinen.lcs.mit.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 11 May 2000, Garrett Wollman wrote:

> Stupidity and inexperience.

That's a scary thought.  "Our security depends on all attackers being
stupid."  Shouldn't we work toward meaningful tools that cannot be
subverted even by the most skilled of attackers?  Not all attackers are
script kiddies and it would be foolish of us to think they are.

> Also, not all break-ins result in root compromise.

Agreed.  But this specific example did involve root compromise.

Paul Hart

--
Paul Robert Hart        ><8>  ><8>  ><8>        Verio Web Hosting, Inc.
hart@iserver.com        ><8>  ><8>  ><8>        http://www.iserver.com/



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005111014310.8386-100000>