At 03:20 PM 7/10/2003 -0500, you wrote:
> > What I like about the first method is that I don't need to worry about
> > anything being put there while I'm not looking. This way I can relax a bit
> > more when dumping to and reading from my temporary files. Am I wrong about
> > feeling safe? With the second method I could blow away /etc/passwd or
> > something if an attacker makes any level of effort. In my mind the second
> > method requires a lot more checking on my part, and even with checking I
> > can't get around several race conditions in a shell script.
>
>ramdisk?

1. This isn't a generic solution.
2. Man that would be a high-powered script.
3. It still gets mounted as a file system so nothing gets solved.

Someone just sent me an email with this note, and I like it: "Variant of 
the first -- create a temporary directory, chdir() to it, and unlink 
it.  Then populate it."


---
Dustin Puryear <[EMAIL PROTECTED]>
Puryear Information Technology, LLC <http://www.puryear-it.com>
Providing expertise in the management, integration, and
security of Windows and UNIX systems, networks, and applications.


Reply via email to