Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!linus!genrad!decvax!harpo!floyd!vax135!cornell!uw-beaver!tektronix!zehntel!ihnp4!houxm!hocda!spanky!burl!duke!goldfarb@ucf-cs.UUCP
From: goldfarb@ucf-cs.UUCP
Newsgroups: net.unix-wizards
Subject: Re: Ideas on UNIX security
Message-ID: <975@ucf-cs.UUCP>
Date: Tue, 21-Jun-83 14:12:57 EDT
Article-I.D.: ucf-cs.975
Posted: Tue Jun 21 14:12:57 1983
Date-Received: Mon, 27-Jun-83 19:27:36 EDT
Lines: 11

I think this discussion is heading in the wrong direction.  Instead of
talking about how we can prevent breaches of password security, perhaps
we should concern ourselves with the broader problem of what to do once
root security has been broken THAT ONE TIME.  How many of you have found
setuid root files appearing in funny places?  No matter what we do with
passwords, etc., once Unix has been  cracked it leaks like a sieve.

--
Ben Goldfarb
uucp:  ...!duke!ucf-cs!goldfarb
ARPA:  goldfarb.ucf-cs@Rand-Relay