1 |
On Tue, Dec 16, 2003 at 11:43:10AM -0800, Michael Reilly wrote: |
2 |
> Depends on how you view security and where you want to put your security. |
3 |
|
4 |
Indeed! It also depends on the type of installation you are thinking |
5 |
about. On the sysadmins own workstation, having more powerful tools |
6 |
available is a blessing. On a shared machine with untrustworthy users, |
7 |
it is a curse. On a single-luser machine it depends: Locking the more |
8 |
dangerous commands away helps to avoid mistakes, whereas adding |
9 |
disturbances to the everyday use makes more (l)users do everything as |
10 |
root, negating the whole purpose. |
11 |
|
12 |
I am fairly new to Gentoo, and do not know what assumptions the security |
13 |
policy is based on. Personally I would prefer a choice on how to set up |
14 |
my systems, but I understand that too many choices invite too many users |
15 |
to choose wrong... Perhaps some system of alternative security defaults |
16 |
- assuming that someone can take the time to set them up? |
17 |
|
18 |
Another day of complex questions and no simple answers... |
19 |
|
20 |
|
21 |
Best regards |
22 |
|
23 |
Heikki |
24 |
|
25 |
|
26 |
|
27 |
|
28 |
-- |
29 |
Heikki Levanto LSD - Levanto Software Development <heikki@×××.dk> |
30 |
|
31 |
|
32 |
-- |
33 |
gentoo-security@g.o mailing list |