"OpenBSD is known for its security policies, and for its boast of "only one remote exploit in over 10 years". Well, make that two, because Core Security has found a remotely expolitable buffer overflow in the OpenBSD kernel. Upgrade your firewalls as soon as possible." Source: Slashdot.org Article: Core Security | Home [OT] Thats 2 in 10 years! but this one isnt exactly critical, its allready been patched and the machine has to have a ipv6 address to be vulnerable! [/OT]
this reminds me, i got an XP update a month or so ago, lol, the funny part is that it says rate in the update this fixes a problem with activeX that fixes an issue that always your computer to be taken over remotely......
dont be so comfortable with that statement Addis, all of my machines have ipv6 addresses on my local network, i never use them... but they all support ipv6, just there not ipv6 accessible from the internet! (just my local network ) Im guessing openBSD is the same, hence why the /. article states you need local network access.
Hence I said its nowhere near mainstream. Does using ipv6 on a local internal network make it mainstream? IMO, if it weren't for NAT we'd have it by now.