[EMAIL PROTECTED] wrote:
> 
> [EMAIL PROTECTED] writes:
> > I'll offer that an SUID program is NOT inherently dangerous.  ping is a
> >  fairly small, uncomplicated program that should, in theory, be easy to
> >  secure from stack smashes and other such nonsense.  A well-designed SUID
> >  program is not a danger.  If it were, all processes run as root would be
> >  inherently dangerous, and you could never manage your system.
> All processes run as root  *are* inherently potentially dangerous.
> The fact that this potential is usually not realized, is the only reason we
> can manage our systems.
> 
And, at the higher levels of Rainbow security, you actually do away
with root as a concept.  Instead, you use something like capabilities
to grant each process only those rights it needs to do its job.

-----------------------------------------------------------------------------------
Jeffry Smith            Technical Sales Consultant           Mission
Critical Linux
[EMAIL PROTECTED]    phone:  978.446.9166, x271     fax: 
978.446.9470
-----------------------------------------------------------------------------------
Thought for today:  Any circuit design must contain at least one part
which is obsolete, two parts
which are unobtainable, and three parts which are still under
development.

**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to