Date: Mon, 24 Feb 1997 17:29:54 -0500 (EST) From: nate@ncsu.edu (Nate Johnson) To: julian@whistle.com (Julian Elischer) Cc: adrian@obiwan.aceonline.com.au, jehamby@lightside.com, hackers@freebsd.org, auditors@freebsd.org Subject: Re: disallow setuid root shells? Message-ID: <9702242229.AA03727@biohazard.csc.ncsu.edu> In-Reply-To: <3311E1FD.167EB0E7@whistle.com> from "Julian Elischer" at Feb 24, 97 10:46:21 am
next in thread | previous in thread | raw e-mail | index | archive | help
%well the security audit should pick up any new suid files each night, Except the case where the hacker truly knows what they're doing, in which case, the security audit will be worthless. root can modify any files he wants, including the database used to compare suid files against. =( nsj -- Nate Johnson / nate@ncsu.edu / nsj@catt.ncsu.edu / nsj@FreeBSD.org Head Systems Administrator, Computer and Technologies Theme Program North Carolina State University, Raleigh, North Carolina
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9702242229.AA03727>