From owner-freebsd-questions Wed Sep 20 06:49:55 1995 Return-Path: owner-questions Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id GAA02841 for questions-outgoing; Wed, 20 Sep 1995 06:49:55 -0700 Received: from cc.jyu.fi (root@cc.jyu.fi [130.234.1.3]) by freefall.freebsd.org (8.6.12/8.6.6) with SMTP id GAA02836 for ; Wed, 20 Sep 1995 06:49:49 -0700 Received: from [130.234.41.39] (zaphod.maccc.jyu.fi) by cc.jyu.fi with SMTP id AA21518 (5.67a/IDA-1.4.4 for questions@Freebsd.org); Wed, 20 Sep 1995 16:53:04 +0300 X-Sender: kallio@pop.jyu.fi Message-Id: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Date: Wed, 20 Sep 1995 16:54:42 +0300 To: questions@Freebsd.org From: kallio@jyu.fi (Seppo Kallio) Subject: * The security of DISKLESS? * Sender: owner-questions@Freebsd.org Precedence: bulk What kind of security holes does DISKLESS include? Some thoughts: 1. Can user boot the DISKLESS to sigle user and then use root provileges? 2. The root partition must be exported with -rootusr=root - maybe it is possible to hide this dir so that user cannot save suid progs and login to the server and use them? - mayb ethere is nosuid in exports preventig to save suid files to root partition 3. Other holes? Seppo -- +-- Seppo Kallio ----- kallio@jyu.fi ---+ ! Computing Center ! Fax +358-41-603611 Phone +358-41-603606 ! ! University of Jyvaskyla ! http://www.jyu.fi/~kallio ! +-- Finland --+-- 62.14N 25.44E -- +