*BSDThis forum is for the discussion of all BSD variants.
FreeBSD, OpenBSD, NetBSD, etc.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
These CERTS look particularly nasty, I'd hate to have a public NetBSD box right now. Hmmmm, I hope these don;t spill over into OpenBSD, there's still a lot of shared code between the two. That could spell disaster.
If you read the release notes for NetBSD 1.6, most of these vulnerabilities (maybe with the exception of 1) are fixed in 1.6. I wish other software vendors were like that about fixing bugs. "Hey, we found this bug in our software, but pgrade to the latest. Its fixed already!"
An update on this issue, some additional vulnerabilities have been just recently published that apply to 1.6. Most of them are not severe, however, since NetBSD defaults to having all services off. (Unlike most *nix, even openssh defaults to being off, though that is not one of the vulnerabilities this time. :-) ) Even OpenBSD boasts to having only one default setup in 6 years with a remote vunerability, not "all programs of OpenBSD". NetBSD's default setup is similarly safe, allowing the competant admin to install a release, update the system, and deploy without worrying about his box being rooted between installation and finding any security bugs that might exist.
NetBSD is actually a very secure operating system. The fact that they find vulnerabilities every now and then and publish them is a result of paying attention to security issues, not a result of the failed "security through obscurity" policy of many closed-source operating systems. NetBSD also warns you if you install a third party package with known vunerabilities. (I think the other BSDs do this too. FreeBSD does.)
Thanks for the info. I have been impressed with way the BSDs handle security issues, and was just wanting to know if all known issues in 1.6 were fixed. It seems that all known security issues were fixed when 1.6 came out, but a couple more have been discovered since then. I guess we can look forward to a few security patches and 1.6.1 in the near future.
There are and will always be insecure pieces of software cause the people developing software are just humans. Humans make mistakes ... code audits are nice but take up a lot of ressources!
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.