On Jan 5, 2008, at 11:22 PM, Karthik Kumar wrote:
Secure by default. Ship with nothing and call it secure. Wow! Maybe it shouldn't start the network by default, huh? Then that's secure, isn't it? Start no daemons, start no shells: ZOMG!!! it's secure :P
Oddly, I find this more sensible than "start with everything wide open and on, because a user doesn't know what he might need."
OpenBSD got pwned a year ago with another remote hole. I hope they find enough so they can stop bragging about 'Secure by default'. Do you realize that many people just can not live with 'default'? Look: people do "use" OpenBSD for things other than plain old fvwm with xterm. And keeping security as a goal is not just for a stupid dubious marketing campaign.
Default works pretty well for me: [EMAIL PROTECTED]'s password: Last login: Sat Jan 5 15:29:22 2008 from 10.10.13.22 OpenBSD 4.1-current (GENERIC) #328: Wed Jul 11 20:22:58 MDT 2007 Welcome to OpenBSD: The proactively secure Unix-like operating system. Please use the sendbug(1) utility to report bugs in the system. Before reporting a bug, please try to reproduce it with the latest version of the code. With bug reports, please try to ensure that enough information to reproduce the problem is enclosed, and if a known fix for it exists, include that as well. $ pkg_info -ac Information for inst:lzo-1.08p1 Comment: portable speedy lossless data compression library Information for inst:openvpn-2.0.6p0 Comment: easy-to-use, robust, and highly configurable VPN Information for inst:pftop-0.6 Comment: curses-based real time state and rule display for pf $