(tech removed from reply, don't cross-post)
If you consistently log on to your system as root, then you probably don't
need many SUID or SGID executables at all, since everything (interactive)
will run with root privileges anyway.
But if you usually log on as an unprivileged user (as you should i
On 2015-01-06 09:33, whoami toask wrote:
https://stribika.github.io/2015/01/04/secure-secure-shell.html
Is the default config for SSHD enough secure?
Or the different distros modifications are the ones that make it not
the best regarding security?
Thanks.
---
(This reply is only to misc@.
Stop cross posting.
Stop posting articles from people who don't know what they're talking about.
Or possibly just stop posting.
On Tue, Jan 6, 2015 at 9:33 AM, whoami toask wrote:
> https://stribika.github.io/2015/01/04/secure-secure-shell.html
>
> Is the default config for SSHD enough secure?
>
Hello,
can you please stop crossposting? Thanks.
--
Regards,
Ville
On Jan 6, 2015 4:34 PM, "whoami toask" wrote:
> https://stribika.github.io/2015/01/04/secure-secure-shell.html
>
> Is the default config for SSHD enough secure?
>
> Or the different distros modifications are the ones that make i
https://stribika.github.io/2015/01/04/secure-secure-shell.html
Is the default config for SSHD enough secure?
Or the different distros modifications are the ones that make it not the best
regarding security?
Thanks.
On 2015-01-05 18:38, etie...@magickarpet.org wrote:
On 2015-01-05 19:51, Ted Unangst wrote:
I would like to know if there is any trigger in CARP, any way to run
a
script on a CARP interface status change? I could monitor
/var/log/messages for that, but is there any cleaner, more efficient
way?
On 2015-01-05 19:51, Ted Unangst wrote:
I would like to know if there is any trigger in CARP, any way to run a
script on a CARP interface status change? I could monitor
/var/log/messages for that, but is there any cleaner, more efficient
way?
ifstated?
Thanks! Sorry, I promise, none of my se
2015-01-06 8:27 GMT+01:00 whoami toask :
> Hello,
>
> isn't there too much SUID/SGID files on a default OpenBSD install?
No.
I think you don't understand how SGID works. A small example:
155910 84 -r-xr-sr-x4 root crontab 41752 Aug 8 08:06
/usr/bin/at/usr/bin/at
If you run 'at' a
On Tuesday 06 January 2015, whoami toask wrote:
> Hello,
>
> isn't there too much SUID/SGID files on a default OpenBSD install?
>
> Can this number be reduced?
Of course it can!
$ find / -perm -4000 -o -perm -2000 -exec chmod 0 {} \;
> Example: why does wall, write, modstat need an SGID?
>
> # u
9 matches
Mail list logo