Date: Fri, 11 Oct 1996 17:08:17 +0200 (MET DST) From: sos@FreeBSD.org To: ache@nagual.ru (=?KOI8-R?Q?=E1=CE=C4=D2=C5=CA_=FE=C5=D2=CE=CF=D7?=) Cc: sos@FreeBSD.org, joerg_wunsch@uriah.heep.sax.de, sos@freefall.freebsd.org, CVS-committers@freefall.freebsd.org, cvs-all@freefall.freebsd.org, cvs-usrsbin@freefall.freebsd.org Subject: Re: cvs commit: src/usr.sbin/ppp command.c Message-ID: <199610111508.RAA00223@SandBox.CyberCity.dk> In-Reply-To: <199610111353.RAA01030@nagual.ru> from "=?KOI8-R?Q?=E1=CE=C4=D2=C5=CA_=FE=C5=D2=CE=CF=D7?=" at Oct 11, 96 05:53:55 pm
index | next in thread | previous in thread | raw e-mail
In reply to áÎÄÒÅÊ_þÅÒÎÏ× who wrote:
>
> > Oops... I guess it was too late in the night when I did that...
> >
> > Any good suggestions as how to make this work securely ??
> > Maybe only allowing the program named in the ppp.xxx file, that
> > way security is at the/etc/ppp level.
>
> Not so complex, just disable 'shell' command in telnet mode.
> As I remember ppp have some flag indicating it running with -auto,
> and/or some flag indicating telnet mode, shell command must check
> those flags and refuse execution.
Will look at that solution...
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Søren Schmidt (sos@FreeBSD.org) FreeBSD Core Team
Even more code to hack -- will it ever end
..
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199610111508.RAA00223>
