On Thu, 11 Sep 2003, Michel Py wrote:
> > Pekka Savola wrote:
> > Incorrect.  Have you even used hosts.allow?  What makes you
> > think it's easily hackable, instantly abusable by a vaguely
> > clued low-level thief?
> 
> Gee, even I could use vi. As soon as you have root access, what is your
> problem? I can vi the hosts.allow file, I don't know how to create a
> tunnel.

Then you have to first compromise the system concerned, going through all 
the other protections.

Before you hack the box to circumvent the hosts.allow you still have to
... well, hack the box!  An interesting chicken and egg problem, no?

In the same vein, one could say that using local addresses gives no
protection because you could just (as root) add a global address on the
box.

-- 
Pekka Savola                 "You each name yourselves king, yet the
Netcore Oy                    kingdom bleeds."
Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings

--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to