Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 17 Aug 1999 21:30:56 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        Barrett Richardson <barrett@phoenix.aye.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Any work around for this FreeBSD bug/DoS  ?
Message-ID:  <4.1.19990817212048.0526b150@granite.sentex.ca>
In-Reply-To: <Pine.BSF.4.01.9908171435560.21777-100000@phoenix.aye.net>
References:  <4.1.19990816203409.05989960@granite.sentex.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
>I've been using a mechanism that prevents the running the arbitrary
>executables on my systems. I require a flag bit to be set for an
>executable to be run -- so if script kiddie uploads or creates
>a binary executable it wont run, unless I approve it by setting the
>flag. At the moment I let shell scripts slide which will leave you
>vunerable to perl -- but that could be easily changed.

Interesting concept, but I guess it would get only the dumbest script
kiddies.  Also, more and more exploits seem to be released on perl to make
them 'cross platform compatible'.

	---Mike
**********************************************************************
Mike Tancsa, Network Admin        *  mike@sentex.net
Sentex Communications Corp,       *  http://www.sentex.net/mike
Cambridge, Ontario                *  01.519.651.3400
Canada                            *


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.1.19990817212048.0526b150>