Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 15 Aug 1998 13:13:09 +0200
From:      Philippe Regnauld <regnauld@deepo.prosa.dk>
To:        rotel@indigo.ie
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: "Using capabilties aaginst shell code" <dps@IO.STARGATE.CO.UK>
Message-ID:  <19980815131309.14782@deepo.prosa.dk>
In-Reply-To: <199808142212.XAA01134@indigo.ie>; from Niall Smart on Fri, Aug 14, 1998 at 11:12:12PM %2B0000
References:  <19980814123240.63855@deepo.prosa.dk> <199808142212.XAA01134@indigo.ie>

next in thread | previous in thread | raw e-mail | index | archive | help
Niall Smart writes:
> 
> As for the example mentioned (no execve for imapd), I'm not sure
> its at all useful.  
> Just because someone can't execve doesn't mean they can't add an entry
> to /etc/passwd or modify roots or the sysadmins .login etc

	The point was to limit the number of outside attacks on 
	priviledged network daemons.  Once the system has been broken
	into, it's over...  "Just keep people out"

> Even better is additionally make chroot secure and put it in there.

	What do you call "making chroot secure" ?

-- 
 -[ Philippe Regnauld / sysadmin / regnauld@deepo.prosa.dk / +55.4N +11.3E ]-

               The Internet is busy.  Please try again later.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980815131309.14782>