22 Aug
2000
22 Aug
'00
11:31
Hi On Mon, Aug 21, 2000 at 05:14:09PM -0400, dproc@dol.net wrote:
This is good. There is always the next bug to find. Anyone know how Debian manage the trick of making it unprivileged? Due to its linking against PAM xlock isn't needed anymore to run as setuid root, or?
Before anyone says it, I suppose it is time for me to audit suid/sgid across my system. There's also a tool called sxid for this one. ftp://marcus.seva.net/pub/sxid/ is its URL
MfG/Regards, Alexander -- Alexander Reelsen http://joker.rhwd.de ref@linux.com GnuPG: pub 1024D/F0D7313C sub 2048g/6AA2EDDB ar@rhwd.net 7D44 F4E3 1993 FDDF 552E 7C88 EE9C CBD1 F0D7 313C Securing Debian: http://joker.rhwd.de/doc/Securing-Debian-HOWTO