On Sun, Nov 07, 1999 at 03:53:50AM +0900, Daniel C. Sobral wrote:
> [and, as you said, the same goes for nosuid -- and for nodev too]
>
> This doesn't enhance security. It enhances auditability. I like
> this. Add a syslog, and a sysctl to turn it on or off. It seems
> straight-forward and ligh
>
>
I forgot, the same could be applied to filesystems mounted as
"nosuid".
Borja.
--
***
Borja Marcos* Internet: [EMAIL PROTECTED]
Alangoeta, 11 1 izq * [EMAIL PROTE
Hello,
Many security exploits create files in the /tmp directory
and execute them. I think it would be a good idea to add logging
to the to exec_check_permissions() in kern.exec.c so that attempts
to run files from a filesystem mounted as "noexec" can be detected.
With
Borja Marcos wrote:
>
> Hello,
>
> Many security exploits create files in the /tmp directory
> and execute them. I think it would be a good idea to add logging
> to the to exec_check_permissions() in kern.exec.c so that attempts
> to run files from a filesystem mounted as "noexec
4 matches
Mail list logo