Simon Richter (Simon.Richter@phobos.fachschaften.tu-muenchen.de) writes:
> If someone gets in, I know how. I reinstall the machine from backup tape,
> and fix the hole. Downtime: six hours.
BWHAHAHA!! The problem is, I've been in your system for the last month, and you just found out - so when you restore the system from backup tape, you just restored all my Trojans and hidden SUID programs. You lose.
What we've done here for the production boxes is to install from the original CD-ROM, then insall the custom software from a CD-ROM burned on an interal system (disconnected from the outside world). Result: we have a guaranteed clean box.
That is, of course, assuming that the original CD-ROM doesn't have security holes and bugs straight from the manufacturer.
-- Ed Carp, N7EKG email@example.com 940/367-2744 cell phone http://www.pobox.com/~erc
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to firstname.lastname@example.org Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Mon May 15 2000 - 21:00:12 EST