Hi,

Could you give an example where using /usr/local is a security issue?

I found it pretty annoying that I cannot easily rely on the PATH (for
example, I have to specify the full path in /etc/xinetd.d/*, while I'd
like xinetd to search /usr/local/bin and /usr/bin. Worse: restarting
xinetd will have /usr/local/bin in its path because root's path
include it, but won't after a reboot, causing services to fail).

If removing /usr/local is crucial wrt security, is there a way to
override the default PATH that survives package upgrades?

Thanks,

-- 
Sylvain


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to