Return to BSD News archive
Newsgroups: comp.os.386bsd.development Path: sserve!newshost.anu.edu.au!munnari.oz.au!constellation!osuunx.ucc.okstate.edu!moe.ksu.ksu.edu!zaphod.mps.ohio-state.edu!menudo.uh.edu!uuneo!sugar!peter From: peter@NeoSoft.com (Peter da Silva) Subject: Re: A challenge to all true hackers: objects and types Organization: NeoSoft Communications Services -- (713) 684-5900 Date: Sat, 27 Mar 1993 10:56:43 GMT Message-ID: <C4JnqK.KFH@sugar.neosoft.com> References: <1993Mar25.184157.1@vxcrna.cern.ch> <1ov988$5l6@umd5.umd.edu> <1993Mar26.222417.1@vxcrna.cern.ch> Lines: 15 In article <1993Mar26.222417.1@vxcrna.cern.ch> roeber@cern.ch writes: > However, it displeases people who take the strict approach of "if I > set a directory to deny some access, everything beneath it has that > access denied." I would think so. You'd break 'chroot' completely, for example. The UNIX security system might not be DoD-level secure, but it works pretty well in practice (the biggest holes being trojan horses). Changing the rules like this means pretty much starting over from scratch. -- Peter da Silva. <peter@sugar.neosoft.com>. `-_-' Oletko halannut suttasi tänään? 'U` Tarjoilija, tämä ateria elää vielä.