Date: Mon, 22 Jan 1996 11:03:44 +0100 (MET) From: Luigi Rizzo <luigi@labinfo.iet.unipi.it> To: imp@village.org (Warner Losh) Cc: hackers@FreeBSD.org, dworkin@rover.village.org Subject: Security (was: Re: Two commands: icat and ils) Message-ID: <199601221003.LAA04703@labinfo.iet.unipi.it> In-Reply-To: <199601220848.BAA28985@rover.village.org> from "Warner Losh" at Jan 22, 96 01:48:08 am
next in thread | previous in thread | raw e-mail | index | archive | help
> I have two commands that I've hacked together: > icat: Will list a file given its inode > ils: Will try all the inodes it can find and list all the I would like to have them. > modestly and send them in? They are, of course, the worlds largest > assault tanks in the battle of security, but they have come in *DAMN* Why ? Security must be enforced with proper protections, not by simply trying to hide information which *is* available. One thing I never liked in FreeBSD: www# ls -l /sbin/init /sbin/shutdown -r-x------ 1 bin bin 143360 Nov 16 10:49 /sbin/init -r-sr-x--- 1 root operator 135168 Nov 16 10:49 /sbin/shutdown as if denying *read* access to these publicly available files would prevent anyone from rebuilding them from the sources or getting a copy from the binary distribution or from the CDROM. Luigi ==================================================================== Luigi Rizzo Dip. di Ingegneria dell'Informazione email: luigi@iet.unipi.it Universita' di Pisa tel: +39-50-568533 via Diotisalvi 2, 56126 PISA (Italy) fax: +39-50-568522 http://www.iet.unipi.it/~luigi/ ====================================================================
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199601221003.LAA04703>