Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 1 Oct 2001 08:54:23 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 1 Oct 2001 08:54:13 -0400 Received: from ookhoi.xs4all.nl ([213.84.114.66]:1927 "EHLO ookhoi.xs4all.nl") by vger.kernel.org with ESMTP id ; Mon, 1 Oct 2001 08:53:57 -0400 Date: Mon, 1 Oct 2001 14:54:19 +0200 From: Ookhoi To: John Jasen Cc: linux-kernel@vger.kernel.org Subject: Re: [OT] New Anti-Terrorism Law makes "hacking" punishable by life in prison Message-ID: <20011001145419.L9327@humilis> Reply-To: ookhoi@dds.nl In-Reply-To: <20011001104130.32696.qmail@optushome.com.au> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.3.19i X-Uptime: 20:50:40 up 1 day, 9 min, 9 users, load average: 0.08, 0.12, 0.05 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org > > > .. but at least fixes appear a lot faster for linux. That alone > > > don't usually leave enough timespan for a large-scale exploit. > > Someone forget bind and rpc.statd worms of about 6 months ago? With bind, the admin could have patched his bind before the worms came alive, he could have upgraded to a new major release, he could have run bind not as root, and he could have run bind chrooted. (for 'he' you can also read 'she'). This for sure was not the fault of the os. Ookhoi - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/