| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
From: Darren Reed <darrenr@vitruvius.arbld.unimelb.edu.au> To: t-jont@microsoft.com (Jonathon Tidswell) Date: Fri, 3 Mar 1995 20:55:06 +1100 (EST) Cc: hallam@dxal18.cern.ch, www-security@ns2.rutgers.edu, t-jont@microsoft.com In-Reply-To: <9503030613.AA29617@netmail2.microsoft.com> from "Jonathon Tidswell" at Mar 3, 95 03:46:10 pm Errors-To: owner-www-security@ns2.rutgers.edu In some email I received from Jonathon Tidswell, they wrote: > > > I believe most of Phil's concerns relate to the security offered by the > shell (none). > (IMO) A shell used in such an environment should offer more comprehensive and > certainly more flexibility than the basic process security model. > Similar problems exist under NT, the lack of setuid() removing some and > the lack > of chroot() adding others. > > I also believe that adding the code to the server is a worse solution. > It is probably appropriate for the commercial vendors to include extras > in their commercial offerings but in a research environment things change > too fast too often that insufficiently analysed code would end up in > the server. > > Comments ... ? ( on or off the list ) > > - Jon Tidswell What are the side effects/benefits of using rsh ? (restricted sh, not the BSD remote sh). darren
| home | help | back | first | fref | pref | prev | next | nref | lref | last | post |