From owner-freebsd-hackers Fri Aug 16 09:31:33 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id JAA27170 for hackers-outgoing; Fri, 16 Aug 1996 09:31:33 -0700 (PDT) Received: from walkabout.asstdc.com.au (imb@walkabout.asstdc.com.au [202.12.127.73]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id JAA27160 for ; Fri, 16 Aug 1996 09:31:26 -0700 (PDT) Received: (from imb@localhost) by walkabout.asstdc.com.au (8.7.5/BSD4.4) id CAA00665 Sat, 17 Aug 1996 02:31:13 +1000 (EST) From: michael butler Message-Id: <199608161631.CAA00665@walkabout.asstdc.com.au> Subject: Re: Routed supports variable-length netmasks? To: nate@mt.sri.com (Nate Williams) Date: Sat, 17 Aug 1996 02:31:13 +1000 (EST) Cc: hackers@freebsd.org In-Reply-To: <199608161532.JAA06486@rocky.mt.sri.com> from Nate Williams at "Aug 16, 96 09:32:15 am" X-Comment: Phone 0419-240-180, International +61-419-240-180 X-Comment: finger imb@asstdc.com.au for PGP public key X-Mailer: ELM [version 2.4ME+ PL22 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > /etc/ppp/ip-up and /etc/ppp/ip-down are run as root, no matter who the > login user is. This also means you must be careful what you put in > there, but since the environment is safeguarded pretty well it would be > hard to break into a system via them. It would be much better if .. i) pppd refused to run any 'world' writable script and .. ii) syslogged the reason for not running it, michael