Joachim Schipper wrote:

On Mon, Jan 15, 2007 at 11:20:27AM -0700, Darren Spruell wrote:
On 1/15/07, Alexander Bochmann <[EMAIL PROTECTED]> wrote:
...on Thu, Jan 11, 2007 at 08:42:35AM +0100, Marc Balmer wrote:

hmm, why are people so proud of their uptimes when it only show they
don't care for their systems?
Bah, uptimes (is it that time of the year again?)...

Last login: Sun Jan  7 19:22:19 2007 from xxxxxxx
OpenBSD 2.3 (LOCAL) #0: Wed Jul 31 12:51:38 CEST 2002

Welcome to OpenBSD: The proactively secure Unix-like operating system.

{104} ls -al /etc/localtime
lrwxr-xr-x 1 root wheel 33 Jun 12 1998 /etc/localtime -> /usr/share/zoneinfo/Europe/Berlin

That's an Internet-connected system, running mail, web, DNS.
Do you sleep well at night exposing that system to the Internet? One
would question the amount of effort to ensure patch application (if at
all possible) on a system so far out of date...

If you are careful, and know what you do, and know what software to run,
you can get away with a very small number of patches.

Still, I do try to upgrade at least once a year.

                Joachim

and behind a good firewall, even old systems like RH6 with a million holes are never going to get exploited as long as you take proper care. in a high volume, public facing infrastructure. there are too many cpanel and IIS servers around to hack, trying to bust into an OBSD box would mean you have to be a real hacker, like U4EA or DFENS or Radikahl or Sidewinder or Tkiller or Datarape or.... One's looking for a car with the doors unlocked, engine running, keys in the ignition, owner nowhere in sight.

Can you show me some 3.6 exploits Alexander? It's hard to doubt someone cares about their system when they hang out on the list. Perhaps really, they actually know what they are doing eh?

Where would I get an exploit for 3.6?, which exploit would I choose? Remote? How many hundreds of those are lying about for ready download? Can you or anyone else we know on the list give a nice howto on this? Just how easy is it compared to the old days when you could run nuke.c on IRC chats and literally shut down someone's Mac Plus on them mid-sentence? Now that was fun. Wasn't even a web back then, just BITNET, majordomo, FTPlists, BB's, archie, WAIS, even encrypted chat /dcc_chat /dcc_send (where'd that go?)

I have a 3.6 system right here, unpatched behind a firewall, and one not behind a firewall. -i'd like to see some skills from the fear-uncertainty-doubt 5th column since everyone's so absolutely sure you'll get hacked if you turn on a computer at all and try to make it do anything useful whatsoever.

uptime 412 days on #drgori he's running an ancient os because informix hasn't altogether disappeared from the base of code run by our v1 app made what, 6 years ago? boy if that one customer who needs it would just scram. -practical need vs. non-useful-perfectionism. the ugly flower never gets picked. I hayyyyte informix, but #drgori never goes down, does it's job, and even though people try, -they just can't get through the defenses in front of him.

Just curious Alexander.  Just curious.

booya.  biff y

-krb

Reply via email to