Date: Tue, 28 Apr 1998 13:50:20 -0700 (PDT) From: Doug White <dwhite@gdi.uoregon.edu> To: joe ferguson <jferg@2boot.com> Cc: freebsd-questions@FreeBSD.ORG, Hans Huebner <hans@artcom.de> Subject: Re: Does this deserve send-pr? Message-ID: <Pine.BSF.3.96.980428134753.11911F-100000@gdi.uoregon.edu> In-Reply-To: <Chameleon.980423173541.jferg@>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 23 Apr 1998, joe ferguson wrote: > I have to agree with Hans. If there is a user command which can > crash the kernel, it is a gross security violation as well as > a violation of Unix philosophy. I've had enough such problems > with popular desktop operating systems! However, Joe Bloe User can't run this, only the sysadmin can. It's assumed the sysadmin knows what they're doing, otherwise they wouldn't be the sysadmin. :) The mount syscall is one of the more powerful (and dangerous) commands in the system -- use with care. If he had mounted a CD with just device nodes on /dev, it would have worked, actually. A decent idea when trying to unspam a system. Or when adding DEVFS. Doug White | University of Oregon Internet: dwhite@resnet.uoregon.edu | Residence Networking Assistant http://gladstone.uoregon.edu/~dwhite | Computer Science Major To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980428134753.11911F-100000>