Gentoo Archives: gentoo-security

From: Bill Moritz <ego@××××××××××.com>
To: David Olsen <lude@××××××××××.com>, Jesse <ras1@××××××××××××.com>
Cc: gentoo-security-return-562-ego=djalterego.com@g.o, gentoo-security@g.o
Subject: Re: [gentoo-security] Changes to traceroute in newest release
Date: Tue, 16 Dec 2003 19:16:47
Message-Id: 20031217011607.M98428@djalterego.com
In Reply to: Re: [gentoo-security] Changes to traceroute in newest release by David Olsen
> SUID exploits are based on the premise that you've already access to > the system in question. If you don't trust people with accounts on > your system, they shouldn't have it.
What about people that run shell servers? Should I have an interview process and a background check on anyone that wants to pay for access to my systems?
> Just another $.02 > > -d
-bill -- gentoo-security@g.o mailing list

Replies

Subject Author
Re: [gentoo-security] Changes to traceroute in newest release Bill Kenworthy <billk@×××××××××.au>