Hi, Could you give an example where using /usr/local is a security issue?
I found it pretty annoying that I cannot easily rely on the PATH (for example, I have to specify the full path in /etc/xinetd.d/*, while I'd like xinetd to search /usr/local/bin and /usr/bin. Worse: restarting xinetd will have /usr/local/bin in its path because root's path include it, but won't after a reboot, causing services to fail). If removing /usr/local is crucial wrt security, is there a way to override the default PATH that survives package upgrades? Thanks, -- Sylvain -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]