Gentoo Logo
Gentoo Spaceship




Note: Due to technical difficulties, the Archives are currently not up to date. GMANE provides an alternative service for most mailing lists.
c.f. bug 424647
List Archive: gentoo-security
Navigation:
Lists: gentoo-security: < Prev By Thread Next > < Prev By Date Next >
Headers:
To: David Olsen <lude@...>, Jesse <ras1@...>
From: "Bill Moritz" <ego@...>
Subject: Re: Changes to traceroute in newest release
Date: Tue, 16 Dec 2003 20:16:23 -0500
> SUID exploits are based on the premise that you've already access to 
> the system in question. If you don't trust people with accounts on 
> your system, they shouldn't have it.

What about people that run shell servers?  Should I have an interview 
process and a background check on anyone that wants to pay for access to my 
systems?

> Just another $.02
> 
> -d

-bill

--
gentoo-security@g.o mailing list

Replies:
Re: Changes to traceroute in newest release
-- Bill Kenworthy
References:
Re: Changes to traceroute in newest release
-- Michael Reilly
Re: Changes to traceroute in newest release
-- James Dennis
Re: Changes to traceroute in newest release
-- David Olsen
Re: Changes to traceroute in newest release
-- Jesse
Re: Changes to traceroute in newest release
-- David Olsen
Navigation:
Lists: gentoo-security: < Prev By Thread Next > < Prev By Date Next >
Previous by thread:
Re: Changes to traceroute in newest release
Next by thread:
Re: Changes to traceroute in newest release
Previous by date:
Re: Changes to traceroute in newest release
Next by date:
Re: Changes to traceroute in newest release


Updated Jun 17, 2009

Summary: Archive of the gentoo-security mailing list.

Donate to support our development efforts.

Copyright 2001-2013 Gentoo Foundation, Inc. Questions, Comments? Contact us.