Date: Thu, 11 May 2000 18:20:13 +0200 From: Sheldon Hearn <sheldonh@uunet.co.za> To: Paul Hart <hart@iserver.com> Cc: Adam Laurie <adam@algroup.co.uk>, freebsd-security@FreeBSD.ORG Subject: Re: envy.vuurwerk.nl daily run output Message-ID: <51416.958062013@axl.ops.uunet.co.za> In-Reply-To: Your message of "Thu, 11 May 2000 10:03:38 CST." <Pine.BSF.4.21.0005110953510.8386-100000@anchovy.orem.iserver.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 11 May 2000 10:03:38 CST, Paul Hart wrote: > But if you have hostile local users with root access, can you even trust > the output from /etc/security? The nightly security run is there to assist the benevolant administrator by highlighting things that the administrator himself (usually) has changed that may influence the security of the system. It is in no way suited to assisting in the tracking down of rooted machines. So can we let this die already? Ciao, Sheldon. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?51416.958062013>