From owner-freebsd-security Sat Aug 29 09:20:26 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id JAA09271 for freebsd-security-outgoing; Sat, 29 Aug 1998 09:20:26 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from gatekeeper.iserver.com (gatekeeper.iserver.com [206.107.170.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id JAA09259 for ; Sat, 29 Aug 1998 09:20:24 -0700 (PDT) (envelope-from hart@iserver.com) Received: by gatekeeper.iserver.com; Sat, 29 Aug 1998 10:19:23 -0600 (MDT) Received: from unknown(192.168.1.109) by gatekeeper.iserver.com via smap (V3.1.1) id xma005553; Sat, 29 Aug 98 10:19:05 -0600 Received: (hart@localhost) by anchovy.orem.iserver.com (8.8.8) id KAA03579; Sat, 29 Aug 1998 10:19:30 -0600 (MDT) Date: Sat, 29 Aug 1998 10:19:30 -0600 (MDT) From: Paul Hart X-Sender: hart@anchovy.orem.iserver.com To: Mike Holling cc: freebsd-security@FreeBSD.ORG Subject: Re: Shell history In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Sat, 29 Aug 1998, Mike Holling wrote: > A sufficiently skilled attacker will probably always be able to get root > once they have shell access on a box. The key is to prevent them from > getting to that point in the first place. That's a broad statement. I won't contest the fact that if users have shell access you are now open to a much larger array of possible attacks (like local SUID buffer overflow attacks and /tmp races), but saying that they will always be able to get root is not an accurate statement. Paul Hart -- Paul Robert Hart ><8> ><8> ><8> Verio Web Hosting, Inc. hart@iserver.com ><8> ><8> ><8> http://www.iserver.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message