[EMAIL PROTECTED] wrote:
>
> [EMAIL PROTECTED] writes:
> > I'll offer that an SUID program is NOT inherently dangerous. ping is a
> > fairly small, uncomplicated program that should, in theory, be easy to
> > secure from stack smashes and other such nonsense. A well-designed SUID
> > program is not a danger. If it were, all processes run as root would be
> > inherently dangerous, and you could never manage your system.
> All processes run as root *are* inherently potentially dangerous.
> The fact that this potential is usually not realized, is the only reason we
> can manage our systems.
>
And, at the higher levels of Rainbow security, you actually do away
with root as a concept. Instead, you use something like capabilities
to grant each process only those rights it needs to do its job.
-----------------------------------------------------------------------------------
Jeffry Smith Technical Sales Consultant Mission
Critical Linux
[EMAIL PROTECTED] phone: 978.446.9166, x271 fax:
978.446.9470
-----------------------------------------------------------------------------------
Thought for today: Any circuit design must contain at least one part
which is obsolete, two parts
which are unobtainable, and three parts which are still under
development.
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************