Gentoo Archives: gentoo-security

From: Bill Moritz <ego@××××××××××.com>
To: David Olsen <lude@××××××××××.com>, Jesse <ras1@××××××××××××.com>
Cc: gentoo-security-return-562-ego=djalterego.com@g.o, gentoo-security@g.o
Subject: Re: [gentoo-security] Changes to traceroute in newest release
Date: Tue, 16 Dec 2003 19:16:47
Message-Id: 20031217011607.M98428@djalterego.com
In Reply to: Re: [gentoo-security] Changes to traceroute in newest release by David Olsen
1 > SUID exploits are based on the premise that you've already access to
2 > the system in question. If you don't trust people with accounts on
3 > your system, they shouldn't have it.
4
5 What about people that run shell servers? Should I have an interview
6 process and a background check on anyone that wants to pay for access to my
7 systems?
8
9 > Just another $.02
10 >
11 > -d
12
13 -bill
14
15 --
16 gentoo-security@g.o mailing list

Replies

Subject Author
Re: [gentoo-security] Changes to traceroute in newest release Bill Kenworthy <billk@×××××××××.au>