Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Sep 2001 14:27:52 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        alexus <ml@db.nexgen.com>
Cc:        freebsd-isp@FreeBSD.ORG, freebsd-security@FreeBSD.ORG
Subject:   Re: protecting /sbin and /usr/local/sbin
Message-ID:  <20010912142752.A26055@xor.obsecurity.org>
In-Reply-To: <000b01c13bcb$2639da10$0d00a8c0@alexus>; from ml@db.nexgen.com on Wed, Sep 12, 2001 at 04:40:24PM -0400
References:  <000b01c13bcb$2639da10$0d00a8c0@alexus>

next in thread | previous in thread | raw e-mail | index | archive | help

--liOOAslEiF7prFVr
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Sep 12, 2001 at 04:40:24PM -0400, alexus wrote:
> hi
>=20
> i noticed some people are trying to use some files from /sbin and
> /usr/local/sbin to retrive some info..

How is this a problem?

> i was wondering if i'll do
>=20
> chmod o-rwx /sbin/* /usr/local/sbin/*
>=20
> Will it do any damages? or i simply can't do this?

You can do it, but if your system relies on non-root users executing
these commands, bits will obviously fail.  I think you're probably
overreacting, though.

Kris

--liOOAslEiF7prFVr
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE7n9NXWry0BWjoQKURAiCEAJ4yfDxWdIqAzsNUqs8mV0uTcGrt8wCg/j3J
RqHXkS/7AOf/rvKrhN7SQUY=
=yRQu
-----END PGP SIGNATURE-----

--liOOAslEiF7prFVr--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010912142752.A26055>