Newsgroups: comp.unix.admin
Path: utzoo!utgpu!cunews!micor!latour!ottsun1!oghma!rjc
From: rjc@oghma.ocunix.on.ca (Robert J Carter)
Subject: Re: Project Athena ( was Re: Non Destructive Version of rm)
Message-ID: <1991May9.051619.364@oghma.ocunix.on.ca>
Organization: Oghma Systems, Ottawa, Ontario
References: <12049@mentor.cc.purdue.edu> <{#_**}@ads.com> <12074@mentor.cc.purdue.edu>
Distribution: na
Date: Thu, 9 May 1991 05:16:19 GMT

In article <12074@mentor.cc.purdue.edu> asg@sage.cc.purdue.edu (The Grand Master) writes:

[deleted]
>
>May be, but I am still not allowed to decide where to mount file system's
>(that is preordained) and I do not have the root password.

[deleted]
>}
>}->Oh, I like your setup even better now. Give all the users root! 
>}

Note from a security type. Your missing one very important point:
having access to the root password is not the problem - what causes the
security hole is having ACCESS to the types of priviledges NORMALLY
associated with the root account. If those priviledges arn't there,
what's the big deal? Granted, it's not the standard practice - but
then, you could easily argue that deviating from standards make a
system more secure by making it more difficult for outsiders to figure
it out.

-- 
|=================================================================| ttfn!
| Robert J Carter           Oghma Systems         Ottawa, Ontario |
| Phone: (613) 565-2840                                           | @     @
| Fax:   (613) 565-2840 (Phone First)      rjc@oghma.ocunix.on.ca |   * *
|=================================================================| \_____/
