Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!linus!genrad!decvax!harpo!floyd!vax135!cornell!uw-beaver!tektronix!zehntel!ihnp4!houxm!hocda!spanky!burl!duke!goldfarb@ucf-cs.UUCP From: goldfarb@ucf-cs.UUCP Newsgroups: net.unix-wizards Subject: Re: Ideas on UNIX security Message-ID: <975@ucf-cs.UUCP> Date: Tue, 21-Jun-83 14:12:57 EDT Article-I.D.: ucf-cs.975 Posted: Tue Jun 21 14:12:57 1983 Date-Received: Mon, 27-Jun-83 19:27:36 EDT Lines: 11 I think this discussion is heading in the wrong direction. Instead of talking about how we can prevent breaches of password security, perhaps we should concern ourselves with the broader problem of what to do once root security has been broken THAT ONE TIME. How many of you have found setuid root files appearing in funny places? No matter what we do with passwords, etc., once Unix has been cracked it leaks like a sieve. -- Ben Goldfarb uucp: ...!duke!ucf-cs!goldfarb ARPA: goldfarb.ucf-cs@Rand-Relay