Re: Root exploit for FreeBSD

From: Mike Tancsa <mike_at_sentex.net>
Date: Thu, 10 Dec 2009 09:55:40 -0500
At 09:41 AM 12/10/2009, Anton Shterenlikht wrote:
> >From my information security manager:
>
>         FreeBSD isn't much used within the University (I 
> understand) and has a
>         (comparatively) poor security record. Most recently, for example:
>
> 
>http://www.h-online.com/security/news/item/Root-exploit-for-FreeBSD-873352.html
>

Some say... world flat... some say roundish. There are lots of 
opinions to choose from. It would be nice to see an actual properly 
designed study quoted... or even some raw data referenced. and I am 
not talking about something vendor sponsored that examines such track records.

In the case of the above mentioned zero day exploit someone posted, I 
think FreeBSD did a GREAT job at getting a fast unofficial patch out 
and then 2 days later an official advisory and patch out.  Take a 
look at their actual track record at http://www.freebsd.org/security 
and judge for yourself based on that.  Note, a good chunk of whats 
there is common across multiple operating systems (e.g ntpd, BIND, openssl etc)

There are lots of reasons why someone might use or not use FreeBSD. 
In my _opinion_, a "poor security record" is not one of them... But 
judge for yourself based on their actual track record.

         ---Mike


--------------------------------------------------------------------
Mike Tancsa,                                      tel +1 519 651 3400
Sentex Communications,                            mike_at_sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada                         www.sentex.net/mike
Received on Thu Dec 10 2009 - 13:55:46 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:58 UTC