On Thu, 11 Jan 2007 09:29:44 -0500
[EMAIL PROTECTED] wrote:

> On Thu, Jan 11, 2007 at 10:06:33AM +0200, Andrei Popescu wrote:
> > On Wed, 10 Jan 2007 17:52:18 -0500
> > cga2000 <[EMAIL PROTECTED]> wrote:
> > 
> > > Mind you, and this is not directly related to the above, I
> > > sometimes have this bizarre feeling that much of this awkwardness
> > > we have to deal with -- in X certainly .. but from the linux
> > > console as well, albeit to a lesser extent -- eventually boils
> > > down to the *NIX model not having been designed from the ground
> > > up with security in mind.
> > 
> > Huh?
> > 
> > > I just cannot see why you should need something extreme such as
> > > root access to install/maintain software.
> > 
> > And let users install any malware they get across on the internet
> > just because it popped up a window with "install me"?
> 
> I've longed for a distinction between packages that assume root 
> priveleges to run and those that do not.  The latter should be 
> installable by any user; the former should require root permission.

/sbin and /usr/sbin vs. /bin and /usr/bin ? Malware doesn't need root
privileges to do bad things.

> To a first approximation, one could distinguish them by the SUID bit
> on any of their executables.
> 
> Of course, there would have to be firther considerations -- the
> packages shoulld have to come from a trusted source, for one thing,
> and be free of conflicts with other packages users might be allowed
> to install.

This will never work. Users will *always* mess it up.

Regards,
Andrei
-- 
If you can't explain it simply, you don't understand it well enough.
(Albert Einstein)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to