On Sat, Sep 28, 2002 at 05:44:58PM +1000, Russell wrote:
> Colin Watson wrote:
> > I think a more sensible rule is to only put directories in $PATH that
> > are at least as trusted as the relevant account. Thus, /usr/bin and so
> > on are always fine, ~/bin is only fine for the owning user, and . is
> > never a good idea.
> 
> Why is ./ in the path bad? If someone hacked in, couldn't they
> set the path to anything they wanted?

Unlike ~/bin, the current directory is not always under your control. If
you put . in $PATH, then 'cd /tmp; ls' is no longer safe.

The current directory is potentially in a different security domain, and
should be treated accordingly. ~/bin is in your own security domain, so
there is no need to worry about using it.

-- 
Colin Watson                                  [[EMAIL PROTECTED]]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to