From owner-freebsd-hackers Mon Jan 22 09:51:17 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id JAA01231 for hackers-outgoing; Mon, 22 Jan 1996 09:51:17 -0800 (PST) Received: from rover.village.org (rover.village.org [198.137.146.49]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id JAA01226 for ; Mon, 22 Jan 1996 09:51:13 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by rover.village.org (8.6.11/8.6.6) with SMTP id KAA29806; Mon, 22 Jan 1996 10:42:25 -0700 Message-Id: <199601221742.KAA29806@rover.village.org> To: Luigi Rizzo Subject: Re: Security (was: Re: Two commands: icat and ils) Cc: hackers@freebsd.org, dworkin@rover.village.org In-reply-to: Your message of Mon, 22 Jan 1996 16:27:14 +0100 Date: Mon, 22 Jan 1996 10:42:24 -0700 From: Warner Losh Sender: owner-hackers@freebsd.org Precedence: bulk : > : Why ? Security must be enforced with proper protections, not by : > : simply trying to hide information which *is* available. : > : > The standard reason that is given is that it bypasses all file system : > checks... However, you need to be root to run it, so maybe that isn't : > such a horrible thing. : : exactly. Also, you already have more powerful tools like "cat" and : "rm" to peek at people's data or destroy information. rm won't remove an immutable file, but if you go through the raw device, you can do that. OR change the immutable file... Like I said, I don't completely understand it, but I'll be putting together a set of "use at your own risk" tools. Warner