Re: any risk in using /home/root

1998-07-28 Thread Marcus Brinkmann
On Mon, Jul 27, 1998 at 08:24:20AM +0200, Matus fantomas Uhlar wrote: > hmmm maybe i'd mount /home as noexec too... users could hate it cause it > would prevent from using scripts and e.g. links to ssh (like > fantomas.fantomas.sk. -> /usr/bin/ssh which would call ssh to > fantomas.fantomas.sk) bu

Re: any risk in using /home/root

1998-07-27 Thread fantomas
-> there's one other small cosideration that I can think of. While I don't -> do this, I know some people keep scripts/binaries for sysadmin use in -> /root. If any of these are suid then you'll have a problem if you mount -> /home as nosuid (something that I do). I sometimes have an suid progra

Re: any risk in using /home/root

1998-07-27 Thread Kevin Conover
there's one other small cosideration that I can think of. While I don't do this, I know some people keep scripts/binaries for sysadmin use in /root. If any of these are suid then you'll have a problem if you mount /home as nosuid (something that I do). I sometimes have an suid program in /root

Re: any risk in using /home/root

1998-07-26 Thread Torsten Hilbrich
On: Sun, 26 Jul 1998 10:43:55 +0800 Jieyao writes: > > I have one partition which I had mounted as /home. I figured that > since this is gonna store user information and files, I might as > well put the root home there too. So I created /home/root and > change /root to a symbolic link to /home/

any risk in using /home/root

1998-07-26 Thread Jieyao
I have one partition which I had mounted as /home. I figured that since this is gonna store user information and files, I might as well put the root home there too. So I created /home/root and change /root to a symbolic link to /home/root Is there any security risk in doing this? One problem th