From owner-freebsd-security Sun Oct 20 19:51:36 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id TAA14628 for security-outgoing; Sun, 20 Oct 1996 19:51:36 -0700 (PDT) Received: from post.io.org (post.io.org [198.133.36.6]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id TAA14610 for ; Sun, 20 Oct 1996 19:51:26 -0700 (PDT) Received: from crunch.io.org (crunch.io.org [198.133.36.156]) by post.io.org (8.7.5/8.7.3) with SMTP id WAA09447; Sun, 20 Oct 1996 22:51:13 -0400 (EDT) Date: Sun, 20 Oct 1996 22:51:12 -0400 (EDT) From: Brian Tao To: David Greenman cc: Ollivier Robert , freebsd-security@freebsd.org Subject: Re: bin/1805: Bug in ftpd In-Reply-To: <199610151911.MAA02970@root.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Tue, 15 Oct 1996, David Greenman wrote: > > Unfortunately, this isn't true for anonymous ftp which runs as root. Doesn't an anon ftp connection open the chrooted /etc/spwd.db though (e.g., /var/spool/ftp/etc/spwd.db, here)? -- Brian Tao (BT300, taob@io.org, taob@ican.net) Senior Systems and Network Administrator, Internet Canada Corp. "Though this be madness, yet there is method in't"