SCO UNIX C2 Security Issues (Re: Why DEC chose SCO UNIX)
A J Annala
annala at neuro.usc.edu
Fri Dec 28 14:10:38 AEST 1990
In article <277916E3.2042 at tct.uucp> chip at tct.uucp (Chip Salzenberg) writes:
>3. The C2 security (as described in #2) can be "relaxed", but not
> disabled. That is, the default kernel permissions can be broadened
> from their fascist defaults, but the kernel is still a C2 kernel.
> So the administrative headaches are still there.
Could someone describe exactly what sysadmsh-->system-->relax actually does
and what more it should do to disable C2 security for software developers?
Thanks, AJ
p.s. The source microfiche for VMS is mostly BLISS, MACRO assembler code
generated from BLISS, some FORTRAN, and a few rare PASCAL programs.
However, I will back away from arguing DEC could have converted VMS
for use in the 386 environment because there are many more machine
dependencies in the source code than I originally realized. Still,
it is curious DEC adopted SCO UNIX/386 MPX for it's 386 platforms.
More information about the Comp.unix.sysv386
mailing list