Contributed by jose on from the WiFi dept.
http://www.wirelessdevnet.com/news/2003/dec/03/news5.html
A quote from the story:
"During the three days of the conference attendees subjected the AirLok to strenuous use and focused penetration and security attacks. The AirLok Appliance performed without interruption or incident. Separately, the operating system that is the foundation of the AirLok Appliance - OpenBSD - has successfully sustained more than two million black-hat hacking attacks over the past three years."
(Comments are closed)
By PCronin () pcronin@nospam.bigfoor.com.nospam on mailto:pcronin@nospam.bigfoor.com.nospam
Comments
By Anonymous Coward () on
But then again, OpenBSD lacks Linux's hype (and that's a GOOD thing imho), and hype is the one thing that sells to management people...
Comments
By Juanjo () on
OpenBSD cannot work as repeater due it doesn't support WDS.
That's a problem IMHO if you wanna OpenBSD inside an AP :(
I had to move to Linux in a Wireless 802.11b AP due to this. Until I need WDS OpenBSD did the work OK, duh.
By Bruce () on
By Anonymous Coward () on
I don't doubt that OpenBSD is a target for black-hats (and white-hats) to attack, if for nothing else, pure prestige. But where the hell did they get that number of 2 million attacks?
Guess it just goes to show that 90% of statistics are made up on the spot :p
Comments
By Dom De Vitto () on
By Anonymous Coward () on
By Ken Simpson () on http://ttul.org/~ksimpson
We based our build system on the flashdist package and made various hacks to the hostap drivers to get it to work with late breaking things like the Apple Airport Extreme and Intel Centrino clients.
The pf package rocked for this application. I also found OpenBSD's simplicity made it easy to work with (and to further simplify so that it could all fit in under 32MB).