From owner-freebsd-questions@FreeBSD.ORG Sat Dec 12 16:23:09 2009 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 31DCF106568F for ; Sat, 12 Dec 2009 16:23:09 +0000 (UTC) (envelope-from freebsd@edvax.de) Received: from mx02.qsc.de (mx02.qsc.de [213.148.130.14]) by mx1.freebsd.org (Postfix) with ESMTP id E40338FC20 for ; Sat, 12 Dec 2009 16:23:08 +0000 (UTC) Received: from r55.edvax.de (port-92-195-228-22.dynamic.qsc.de [92.195.228.22]) by mx02.qsc.de (Postfix) with ESMTP id 666AB1E867; Sat, 12 Dec 2009 17:23:06 +0100 (CET) Received: from r55.edvax.de (localhost [127.0.0.1]) by r55.edvax.de (8.14.2/8.14.2) with SMTP id nBCGN4of001518; Sat, 12 Dec 2009 17:23:06 +0100 (CET) (envelope-from freebsd@edvax.de) Date: Sat, 12 Dec 2009 17:23:04 +0100 From: Polytropon To: Kurt Buff Message-Id: <20091212172304.d637d697.freebsd@edvax.de> In-Reply-To: References: <20091210144141.GB834@mech-cluster241.men.bris.ac.uk> <86tyvxlk68.fsf@ds4.des.no> <4B225077.3040009@stillbilde.net> <4297a9020912111153r1ec93838i12d1fd3aae5c61e@mail.gmail.com> Organization: EDVAX X-Mailer: Sylpheed 2.4.7 (GTK+ 2.12.1; i386-portbld-freebsd7.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org Subject: Re: Root exploit for FreeBSD X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Polytropon List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 12 Dec 2009 16:23:09 -0000 On Fri, 11 Dec 2009 13:01:51 -0800, Kurt Buff wrote: > Well, yes, except this assumes one has access to the sysadmin... Physical access. It's hard to exploit a sysadmin by social engineering because he hardly has any friends. :-) -- Polytropon Magdeburg, Germany Happy FreeBSD user since 4.0 Andra moi ennepe, Mousa, ...