Hi Ian,

> We have a set-up that uses "rbash". The client gets "rbash" as a 
> login shell and his path is preset to a directory that has a few 
> chosen executables in it.

Most interesting.
Sounds like it would do just what I want.
I'm on to it.

> I suspect a determined hacker could get around this, but it 
> discourages most abusers.

<sigh>
We can only try.

If they do get out I still try and catch 'em with Firewall rules,
hashed log files, Tripwire, Snort packet sniffing/logging.

Plus those trusty back ups come in handy sometimes :-)

Many thanks,
Best regards
Rudi.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to