Date: Mon, 22 Jan 1996 11:03:44 +0100 (MET) From: Luigi Rizzo <luigi@labinfo.iet.unipi.it> To: imp@village.org (Warner Losh) Cc: hackers@FreeBSD.org, dworkin@rover.village.org Subject: Security (was: Re: Two commands: icat and ils) Message-ID: <199601221003.LAA04703@labinfo.iet.unipi.it> In-Reply-To: <199601220848.BAA28985@rover.village.org> from "Warner Losh" at Jan 22, 96 01:48:08 am
next in thread | previous in thread | raw e-mail | index | archive | help
> I have two commands that I've hacked together:
> icat: Will list a file given its inode
> ils: Will try all the inodes it can find and list all the
I would like to have them.
> modestly and send them in? They are, of course, the worlds largest
> assault tanks in the battle of security, but they have come in *DAMN*
Why ? Security must be enforced with proper protections, not by
simply trying to hide information which *is* available. One thing
I never liked in FreeBSD:
www# ls -l /sbin/init /sbin/shutdown
-r-x------ 1 bin bin 143360 Nov 16 10:49 /sbin/init
-r-sr-x--- 1 root operator 135168 Nov 16 10:49 /sbin/shutdown
as if denying *read* access to these publicly available files would
prevent anyone from rebuilding them from the sources or getting a
copy from the binary distribution or from the CDROM.
Luigi
====================================================================
Luigi Rizzo Dip. di Ingegneria dell'Informazione
email: luigi@iet.unipi.it Universita' di Pisa
tel: +39-50-568533 via Diotisalvi 2, 56126 PISA (Italy)
fax: +39-50-568522 http://www.iet.unipi.it/~luigi/
====================================================================
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199601221003.LAA04703>
