On Tue, 19 Jan 2016 20:46:00 +0000, Rainer wrote in message 
<87d1sxguwn....@doppelsaurus.mobileactivedefense.com>:

> k...@aspodata.se writes:
> > Arnt Gulbrandsen:
> >> By now, the concept of unprivileged local users is a little
> >> obsolete anyway.
> >
> > Yes, unless you let your kids or some guests use your computer.
> 
> How many of your "kids and guests" even know what a kernel is, let
> alone how to exploit a bug in one?

..systemd? ;oD

> >> Today, hosts generally serve only one unix user, there 
> >> generally is only one local user of one host, and that local user
> >> is the user that owns everything valuable. So is the a real point
> >> to local-user-to-root exploits? I suppose there is, but it is much
> >> smaller than it was ten or twenty years ago.
> >
> > The problem is not the local user == the owner, instead it is an 
> > unknown breaking in as a local user and then gaining root powers.
> 
> That's not going to be terribly difficult on a system I use as
> accounts I'm using usually can get root via sudo without entering a
> password. 

..why did Debian kill ssh into localhost?  
Is su or sudo safer than ssh nowadays?

-- 
..med vennlig hilsen = with Kind Regards from Arnt Karlsen
...with a number of polar bear hunters in his ancestry...
  Scenarios always come in sets of three: 
  best case, worst case, and just in case.
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to