Date: Wed, 12 Sep 2001 14:27:52 -0700 From: Kris Kennaway <kris@obsecurity.org> To: alexus <ml@db.nexgen.com> Cc: freebsd-isp@FreeBSD.ORG, freebsd-security@FreeBSD.ORG Subject: Re: protecting /sbin and /usr/local/sbin Message-ID: <20010912142752.A26055@xor.obsecurity.org> In-Reply-To: <000b01c13bcb$2639da10$0d00a8c0@alexus>; from ml@db.nexgen.com on Wed, Sep 12, 2001 at 04:40:24PM -0400 References: <000b01c13bcb$2639da10$0d00a8c0@alexus>
next in thread | previous in thread | raw e-mail | index | archive | help
--liOOAslEiF7prFVr Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Sep 12, 2001 at 04:40:24PM -0400, alexus wrote: > hi >=20 > i noticed some people are trying to use some files from /sbin and > /usr/local/sbin to retrive some info.. How is this a problem? > i was wondering if i'll do >=20 > chmod o-rwx /sbin/* /usr/local/sbin/* >=20 > Will it do any damages? or i simply can't do this? You can do it, but if your system relies on non-root users executing these commands, bits will obviously fail. I think you're probably overreacting, though. Kris --liOOAslEiF7prFVr Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7n9NXWry0BWjoQKURAiCEAJ4yfDxWdIqAzsNUqs8mV0uTcGrt8wCg/j3J RqHXkS/7AOf/rvKrhN7SQUY= =yRQu -----END PGP SIGNATURE----- --liOOAslEiF7prFVr-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010912142752.A26055>