From owner-freebsd-hackers Fri Jun 30 09:01:48 1995 Return-Path: hackers-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id JAA06592 for hackers-outgoing; Fri, 30 Jun 1995 09:01:48 -0700 Received: from labinfo.iet.unipi.it (labinfo.iet.unipi.it [131.114.9.5]) by freefall.cdrom.com (8.6.10/8.6.6) with ESMTP id JAA06571 for ; Fri, 30 Jun 1995 09:01:31 -0700 Received: from localhost (luigi@localhost) by labinfo.iet.unipi.it (8.6.5/8.6.5) id SAA03660 for hackers@freebsd.org; Fri, 30 Jun 1995 18:00:32 +0200 From: Luigi Rizzo Message-Id: <199506301600.SAA03660@labinfo.iet.unipi.it> Subject: Access rights on /sbin/init and other files To: hackers@freebsd.org Date: Fri, 30 Jun 1995 18:00:32 +0200 (MET DST) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 859 Sender: hackers-owner@freebsd.org Precedence: bulk What is the point of having the following access rights ? -r-x------ 1 bin bin 151552 Jun 10 12:04 /sbin/init -r-x------ 1 bin bin 12288 Jun 10 12:04 /usr/sbin/watch To me it makes no sense to deny read/execute permission to standard executables. They don't contain critical data, are not SUID/SGID, and any user can get a copy of them anyways, from the distribution. Can we change the modes to 555 in future snapshots/distributions ? Luigi ==================================================================== Luigi Rizzo Dip. di Ingegneria dell'Informazione email: luigi@iet.unipi.it Universita' di Pisa tel: +39-50-568533 via Diotisalvi 2, 56126 PISA (Italy) fax: +39-50-568522 http://www.iet.unipi.it/~luigi/ ====================================================================