On Sat, 26 Feb 2000, Marcus Brinkmann wrote:

> On Thu, Feb 24, 2000 at 04:25:25PM -0500, [EMAIL PROTECTED] wrote:
> > 
> > It does make more sense though that you should give the possible
> > attacker as little information about the system as you can.
> 
> In general, security through obscurity is not sufficient as a protection
> strategy.

Marcus.

This is not security by obscurity.  It is long-established practice.

> 
> The user login name is often very exposed, for example in email addresses,
> log files etc. If you already have an account, you can usually just list
> /home to get all user names of a system.

But the problem pointed out allows an attacker *without* an account to gain
information.

        <snip>

----
Guy W. Hulbert                                  At Work:
[EMAIL PROTECTED]                               [EMAIL PROTECTED]

Reply via email to