Date: Wed, 14 Aug 1996 18:03:14 -0400 From: "Kevin P. Neal" <kpneal@interpath.com> To: Joe Greco <jgreco@brasil.moneng.mei.com> Cc: jgreco@brasil.moneng.mei.com, ulf@lamb.net, jkh@time.cdrom.com, hackers@freebsd.org Subject: Re: Nightmare. Message-ID: <1.5.4.32.19960814220314.0074ba08@interpath.com>
next in thread | raw e-mail | index | archive | help
At 04:30 PM 8/14/96 -0500, Joe Greco wrote:
>> >I tend to agree, but wonder if it would not make more sense to tackle this
>> >from a different angle.
>> >
>> >Consider all the programs that could clobber a mounted file system. Would
>> >it make more sense if we somehow protected a mounted disk device from
>> >being clobbered?
>>
>> Isn't this one of the things that secure_level > 0 protects you from?
>>
>> In fact, yes it is. (reference: page 263, 4.4BSD daemon book).
>>
>> >OTOH, this is a can of worms, no matter how you do it.
>
>Maybe I don't need to point this out, but...
>
>The thread started with some beginners who made a sad mistake. It seems to
>me that in order to set securelevel > 0, you need to know what you are
>doing. How do you protect the newbies who are not used to UNIX/FreeBSD
>and who therefore would not have any idea to set securelevel > 0..
Set it to default with securelevel > 0, but you can't.......
>We don't default to a securelevel > 0.
.....because of another can of worms that gets opened by securelevel > 0.
>> >OTOH, this is a can of worms, no matter how you do it.
^^ pretty much.
--
XCOMM Kevin P. Neal, Sophomore, Comp. Sci. \ kpneal@interpath.com
XCOMM "Corrected!" -- Old Amiga tips file \ kpneal@eos.ncsu.edu
XCOMM Visit the House of Retrocomputing: / Perm. Email:
XCOMM http://www4.ncsu.edu/~kpneal/www/ / kevinneal@bix.com
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1.5.4.32.19960814220314.0074ba08>
