From owner-freebsd-security Sat Dec 14 11:32:31 1996 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id LAA02317 for security-outgoing; Sat, 14 Dec 1996 11:32:31 -0800 (PST) Received: from eternal.dusk.net (root@eternal.dusk.net [207.219.16.2]) by freefall.freebsd.org (8.8.4/8.8.4) with ESMTP id LAA02306 for ; Sat, 14 Dec 1996 11:32:27 -0800 (PST) Received: (from vlad@localhost) by eternal.dusk.net (8.8.4/8.8.4) id PAA05834 for freebsd-security@freebsd.org; Sat, 14 Dec 1996 15:31:12 -0400 (AST) From: Christian Hochhold Message-Id: <199612141931.PAA05834@eternal.dusk.net> Subject: questions... To: freebsd-security@freebsd.org Date: Sat, 14 Dec 1996 15:31:12 -0400 (AST) X-URL: http://www.dusk.net & http://www.vampires.net X-Moto: Live for today and let the future take care of itself X-Mailer: ELM [version 2.4ME+ PL22 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Hello, Could someone answer a quick question for me, it would be most appreciated. The /sbin directory's ( as an example ) files seem to be executable by anyone on the system. I have changed a few of the files ( ie. dmesg ) to be executable by root as well as the bin group only. What files should I be most concerned about that users can execute ( such as ifconfig ) but really have no business to? What about directories such as / ? Thanks in advance =) Christian