Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Feb 1997 17:29:54 -0500 (EST)
From:      nate@ncsu.edu (Nate Johnson)
To:        julian@whistle.com (Julian Elischer)
Cc:        adrian@obiwan.aceonline.com.au, jehamby@lightside.com, hackers@freebsd.org, auditors@freebsd.org
Subject:   Re: disallow setuid root shells?
Message-ID:  <9702242229.AA03727@biohazard.csc.ncsu.edu>
In-Reply-To: <3311E1FD.167EB0E7@whistle.com> from "Julian Elischer" at Feb 24, 97 10:46:21 am

next in thread | previous in thread | raw e-mail | index | archive | help
%well the security audit should pick up any new suid files each night,

Except the case where the hacker truly knows what they're doing, in which
case, the security audit will be worthless.  root can modify any files he
wants, including the database used to compare suid files against. =(

nsj

--
Nate Johnson / nate@ncsu.edu / nsj@catt.ncsu.edu / nsj@FreeBSD.org
Head Systems Administrator, Computer and Technologies Theme Program
North Carolina State University, Raleigh, North Carolina




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9702242229.AA03727>