Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

System cracked, a story



----- Original Message ----- 
From: "Rich Braun" <richb at pioneer.ci.net>
To: <discuss at blu.org>
Sent: Monday, May 26, 2003 12:46 PM
Subject: Re: System cracked, a story
[snip]
> There is an architectural issue about Linux that I've long wondered about.
> Why hasn't the security model been DRASTICALLY enhanced so as to narrow
the
> scope of what each application can do?  For example, a sendmail program
> doesn't really need root

You can chroot-jail everything... I imagine there are tools or modified
Linux distributions to assist.

Doesn't OpenBSD chroot everything, so almost nothing runs as a root user? I
know very little about OpenBSD but I seem to recall reading this.






BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org