From owner-freebsd-questions@FreeBSD.ORG Fri May 29 11:03:33 2009 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 467BB1065677 for ; Fri, 29 May 2009 11:03:33 +0000 (UTC) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from wojtek.tensor.gdynia.pl (wojtek.tensor.gdynia.pl [IPv6:2001:4070:101:2::1]) by mx1.freebsd.org (Postfix) with ESMTP id 045C88FC17 for ; Fri, 29 May 2009 11:03:31 +0000 (UTC) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from wojtek.tensor.gdynia.pl (localhost [IPv6:::1]) by wojtek.tensor.gdynia.pl (8.14.3/8.14.3) with ESMTP id n4TB3OXY010330; Fri, 29 May 2009 13:03:25 +0200 (CEST) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from localhost (wojtek@localhost) by wojtek.tensor.gdynia.pl (8.14.3/8.14.3/Submit) with ESMTP id n4TAoZXE010280; Fri, 29 May 2009 12:50:35 +0200 (CEST) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Date: Fri, 29 May 2009 12:50:35 +0200 (CEST) From: Wojciech Puchar To: perryh@pluto.rain.com In-Reply-To: <4a1f9cf7.UEl7lAiK4FGe5eG7%perryh@pluto.rain.com> Message-ID: References: <200905281030.n4SAUXdA046386@banyan.cs.ait.ac.th> <200905280847.12966.kirk@strauser.com> <200905280904.44025.kirk@strauser.com> <20090528183801.82b36bbb.freebsd@edvax.de> <4a1f9cf7.UEl7lAiK4FGe5eG7%perryh@pluto.rain.com> User-Agent: Alpine 2.00 (BSF 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: freebsd-questions@freebsd.org Subject: Re: Remotely edit user disk quota X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 29 May 2009 11:03:33 -0000 > Wojciech Puchar wrote: > >> Even 15 seconds of thinking is enough to understand that logging >> to other user and then su - gives completely no extra security. > > I don't buy this, given that root's login name is well known :) if someone can intercept the passwords you type, then he/she will intercept both user password you log in and then su password you type. He/she actually can gain more if you use su, as you may use the same user password somewhere else.