home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!zaphod.mps.ohio-state.edu!news.acns.nwu.edu!network.ucsd.edu!sdcc12!xm9
- From: xm9@sdcc12.ucsd.edu (richard g. adair)
- Newsgroups: comp.sys.hp
- Subject: Re: Poor HP response to CERT
- Summary: Security
- Keywords: Security
- Message-ID: <36798@sdcc12.ucsd.edu>
- Date: 13 Aug 92 14:34:50 GMT
- References: <unruh.713606206@physics.ubc.ca> <36747@sdcc12.ucsd.edu> <Bsvp22.7D4@solbourne.com>
- Sender: news@sdcc12.ucsd.edu
- Organization: Arete Associates, San Diego
- Lines: 18
- Nntp-Posting-Host: sdcc12.ucsd.edu
-
- In article <Bsvp22.7D4@solbourne.com> imp@solbourne.com (Warner Losh) writes:
- >In article <36747@sdcc12.ucsd.edu> xm9@sdcc12.ucsd.edu (richard g.
- >adair) writes:
- >>The amusing thing is that VMS was touted to be secure. Guffaw!
- >A secure system can still have bugs. That is the nature of the game.
- >Dec's policy about security and VMS mandates that they release these
- >patches so that systems are compromised. It appears that HP doesn't
- >care enough about security to fix problems with it. That is the only
- >way that unix will become more secure.
-
- The only way that a networked UNIX machine will be secure is to rip
- out all the old TCP/IP utilities and replace them with a more secure
- protocol. See articles about the OSF effort, because that is
- exactly what they are doing :-)
-
- Tony Burzio
- Arete Associates
- San Diego, CA
-