Unix security additions
Peter da Silva
peter at ficc.ferranti.com
Wed Apr 24 01:49:15 AEST 1991
In article <1991Apr12.101319.8523 at jarvis.csri.toronto.edu> thomson at hub.toronto.edu (Brian Thomson) writes:
> In article <PONA272 at xds13.ferranti.com> peter at ficc.ferranti.com (Peter da Silva) writes:
> >In article <19183 at rpp386.cactus.org> jfh at rpp386.cactus.org (John F Haugh II) writes:
> >> Likewise, if you can only restore
> >> files that were backed up using the special utilities, you can't just
> >> put any program you want on the system.
> >Sure: back up to tape, read tape on a non-secure system, edit it, write
> >it out again, and restore.
> You don't get a secure installation by buying a secure machine and
> putting it in a location where a user can tamper with its backup tapes.
We're not talking about random users here. We're talking about the regular
backup operators.
> Of course secure systems require physical safeguards!
Of course, but who watches the people who work behind those safeguards?
--
Peter da Silva. `-_-' peter at ferranti.com
+1 713 274 5180. 'U` "Have you hugged your wolf today?"
More information about the Comp.unix.internals
mailing list