Yes, we were right (about OpenSSL).  And we were right about it for a long
time now.  I'm surprised that you didn't figure this out by yourself (or at
least read it somewhere).  If you followed ANY of the posts over the past
couple days you would see that we proved this time and again!

"rpm -q --changelog openssl"   <- do I need to explain this command to you?

Next time before jumping to conclusions over things that you know little
about, take some time to see if anyone else posted similar.

And note that this list is for RedHat users/admins/developers.  Please keep
your "Ra-Ra" BSD-related quotations to yourself.  It's too early in the
morning to deal with anti-RedHat/anti-RPM comments like this!


-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of James Wilson
Sent: Friday, September 20, 2002 9:29 AM
To: [EMAIL PROTECTED]
Subject: RE: You may still be vunerable to the Slapper Worm


It looks like you were right guys, the rpm tool once again has failed to do
anything useful and once I upgraded from src its closed the vunerability.
I'd apologise for the misinformation, but it seems that you enjoyed the
chance for righteous flaming.

Jam

www.freebsd.org

Ironic isn't it that the less popular an os is the better the pkg management
is
Windows is famed for its erratic and late patching
Redhat's RPM tool is a joke that failed to be funny 3 years ago.
Debian is gettin there slowly with apt-get.
And FreeBSD allows you to patch OpenSSL from src in under 3 minutes.



-----Original Message-----
From: Edward Wildgoose [mailto:[EMAIL PROTECTED]]
Sent: 20 September 2002 15:00
To: [EMAIL PROTECTED]
Subject: RE: You may still be vunerable to the Slapper Worm


> What Red Hat has done is issue patches before the vulnerabilities are
> exploited.  They don't wait until the customer is screwed before getting
> around to fixing the bugs.  Some vendors (a large Redmond-based software
> company comes to mind) play Russian roulette and wait until the exploits
> are out there, and then fix the bugs. The customer loses.

Actually this is also standard practice for AV software companies as well. I
have had arguments with tech support at Norton and McAfee about "low" risk
virus's and why they are not scanned for yet.  The answer is always that
they can't afford to have the scanner slow down, so they only add it to the
definitions once it is officially "in the wild".

You can see this if you watch the web-site alerts from some of the big
names.  They do stuff like issuing dates when first detected, what the
current "threat rating" is, and also when the defs were available from.
Usually the defs are only updated well after the virus is detected and only
once there is an "outbreak".

You can understand the logic, but it is a little bit backwards in a way...

Anyway, sorry for the OT

Ed W



--
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list



--
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to