I'm not one to condone shitty attitudes.

However, I think in this case it's unfair to claim that one can have
no expectations of OpenBSD with regards to security patches.  If I
could have no such expectations, I would not use OpenBSD in the first
place.  I have these expectations based on a very impressive security
history for which the OpenBSD developers deserve much in the way of
praise.

Additionally, loyal OpenBSD users may be interested in the details of
the vulnerability disclosure.  There very well maybe loyal OpenBSD
users who wish to very politely inform ISC that there are large
numbers of BIND users who would appreciate the same level of
cooperation between ISC and OpenBSD as ISC affords others.

On Wed, Jul 9, 2008 at 11:17 AM, Andreas Maus
<[EMAIL PROTECTED]> wrote:
> On Wed, Jul 09, 2008 at 12:22:17PM -0400, bofh wrote:
>> Love your gimme gimme attitude.  If you spent half a second thinking about 
>> this:
> Hehehe ;)
>
> Furthermore you can see in the US-CERT that this VULN was:
>
> Date First Published    07/08/2008 02:46:15 PM
>
> As you know some developers may live outside .us in a different
> timezone (and developers in .us/.ca have to work at this time).
> So in e.g. Europe this was yesterdays evening.
>
> You can accelerate proceedings by a) donating to OpenBSD
> and b) - if you need this patch REALLY FAST - hire a paid
> conslutant to develope the patch and send it to the list.
>
> And OpenBSD doesn't have a SLA ...
>
> So long,
>
> Andreas.
>
> --
> Windows 95: A 32-bit patch for a 16-bit GUI shell running on top of
> an 8-bit operating system written for a 4-bit processor by a 2-bit
> company who cannot stand 1 bit of competition.

Reply via email to