Date: Tue, 17 Aug 1999 21:30:56 -0400 From: Mike Tancsa <mike@sentex.net> To: Barrett Richardson <barrett@phoenix.aye.net> Cc: freebsd-security@freebsd.org Subject: Re: Any work around for this FreeBSD bug/DoS ? Message-ID: <4.1.19990817212048.0526b150@granite.sentex.ca> In-Reply-To: <Pine.BSF.4.01.9908171435560.21777-100000@phoenix.aye.net> References: <4.1.19990816203409.05989960@granite.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
>I've been using a mechanism that prevents the running the arbitrary >executables on my systems. I require a flag bit to be set for an >executable to be run -- so if script kiddie uploads or creates >a binary executable it wont run, unless I approve it by setting the >flag. At the moment I let shell scripts slide which will leave you >vunerable to perl -- but that could be easily changed. Interesting concept, but I guess it would get only the dumbest script kiddies. Also, more and more exploits seem to be released on perl to make them 'cross platform compatible'. ---Mike ********************************************************************** Mike Tancsa, Network Admin * mike@sentex.net Sentex Communications Corp, * http://www.sentex.net/mike Cambridge, Ontario * 01.519.651.3400 Canada * To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.1.19990817212048.0526b150>