Greg Hudson writes:
 > > Dan's anonftpd chroots itself, and there's no way out.  Crackers
 > > simply cannot break authentication because there *is* no
 > > authentication.  Anybody can download only the files in the ftpd
 > > directory.  Anything else is less secure.
 > 
 > But giving Dan's anonftpd the binary label "secure" and anything
 > different the binary label "insecure" seems misleading to me.

I didn't say anonftpd was secure.  I said that the ftp server I'm
using was insecure (wuftpd -- check it out on www.rootshell.com), and
that by comparison, anonftpd was secure.  Everything in the security
field is relative -- and only needs to be.

-- 
-russ nelson <[EMAIL PROTECTED]>  http://crynwr.com/~nelson
Crynwr sells support for free software  | PGPok | Government schools are so
521 Pleasant Valley Rd. | +1 315 268 1925 voice | bad that any rank amateur
Potsdam, NY 13676-3213  | +1 315 268 9201 FAX   | can outdo them. Homeschool!

Reply via email to