On Sun, Nov 14, 2010 at 10:51 AM, Jan Wildeboer <jwildebo(a)redhat.com> wrote:
be excluded under this new doctrine. Think of nmap, wireshark etc.
Tools
that have a perfect use for debugging but can also be used for not-so-good
things.
Here's the thing here. Nmap and wireshark do not *actively* exploit
systems, nor hold themselves out as tools for doing so. Note that the
language gives the Board the discretion, not the requirement, to deny
inclusion of packages, so an analysis of all existing packages in the
repository is not only not required, it's quite impractical.
-Jon, speaking for himself