--s9fJI615cBHmzTOP
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
On Fri, Sep 07, 2001 at 08:11:07AM -0700, Matt Alexander wrote:
> On Fri, 7 Sep 2001, David A. Sinck wrote:
>=20
> >
> >
> > \_ SMTP quoth Matt Alexander on 9/6/2001 17:35 as having spake thusly:
> > \_
> > \_ On Thu, 6 Sep 2001, Matt Alexander wrote:
> > \_
> > \_ P.S. You should also get in the habit of specifying the full path t=
o any
> > \_ programs you use in your shell scripts. So in the above test, use
> > \_ /usr/bin/whoami instead of just whoami.
> >
> > I haven't tried this in a malicious setting, but I bet chroot could
> > foil that too.
>=20
> On most Unix systems, only root can use the chroot command.
> ~M
I was wondering about that... I've built whole distros from scratch, and
I've noticed that if joe blow user has access to the chroot command, he
could (theoreticially) root the system by creating a minidistro in his home
directory. I've yet to test my theory, though. I'll bet there's a safeguard
in there somewhere to prevent this.
--=20
Thomas "Mondoshawan" Tate
phoenix@psy.ed.asu.edu
http://tank.dyndns.org
--s9fJI615cBHmzTOP
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see
http://www.gnupg.org
iD8DBQE7mOhVYp5mUsPGjjwRAuteAKCWOEZ1doAaRLoo2sYcAb+vslpYGgCfcE5P
+Ud74YbEt12d59+kPtwUoq0=
=okjr
-----END PGP SIGNATURE-----
--s9fJI615cBHmzTOP--