From: | Bill Moritz <ego@××××××××××.com> | ||
---|---|---|---|
To: | David Olsen <lude@××××××××××.com>, Jesse <ras1@××××××××××××.com> | ||
Cc: | gentoo-security-return-562-ego=djalterego.com@g.o, gentoo-security@g.o | ||
Subject: | Re: [gentoo-security] Changes to traceroute in newest release | ||
Date: | Tue, 16 Dec 2003 19:16:47 | ||
Message-Id: | 20031217011607.M98428@djalterego.com | ||
In Reply to: | Re: [gentoo-security] Changes to traceroute in newest release by David Olsen |
1 | > SUID exploits are based on the premise that you've already access to |
2 | > the system in question. If you don't trust people with accounts on |
3 | > your system, they shouldn't have it. |
4 | |
5 | What about people that run shell servers? Should I have an interview |
6 | process and a background check on anyone that wants to pay for access to my |
7 | systems? |
8 | |
9 | > Just another $.02 |
10 | > |
11 | > -d |
12 | |
13 | -bill |
14 | |
15 | -- |
16 | gentoo-security@g.o mailing list |
Subject | Author |
---|---|
Re: [gentoo-security] Changes to traceroute in newest release | Bill Kenworthy <billk@×××××××××.au> |