On Sun, Jul 25, 2010 at 4:16 PM, bofh <[email protected]> wrote:
> Ok, when I first learnt how to use unix nearly 20 years ago, one of
> the things I learnt was that a privileged user can break shit, but
> should not cause kernels to hang or crash.  That would be considered a
> bug.  Only DOS and windows 3.1 do that :)

Hahahaha

cp /etc/termcap /dev/mem

That has crashed *every* version UNIX I have worked with, substituting
an alternative large file on those pure sysv systems without
/etc/termcap, of course.

But let's say we figure out a way to do what you suggest and have the
kernel robust and protected against all actions of a privileged user.
What does that get us?  They can still fuck up ld.so or libc, and
poof, most the programs on the system will crash when started!
Overwrite /etc/passwd with /dev/random and rename /bin and your system
will stop being useful.

WHAT PROBLEM ARE YOU TRYING TO SOLVE?


Philip Guenther

Reply via email to