a lot of system programs store their default config file there (lynx comes to mind) so yes there will be issues. there really isnt a reason i can think of that making /etc readable by root only would help security all that much. id suggest making the compiler(s) runable only by root(same for the libraries the compilers use) make users home dirs on another partition mounted with at least the noexec option and make sure there is no directories writable by users(like /tmp) on a partition that is not mounted with such options. I also suggest using a patched kernel (www.openwall.com/linux comes to mind) and install a stackgaurd compiler so anything that IS compiled has some kind of protection(its not perfect but better then nothing in most cases -- note dont compile the kernel with stackgaurd)
*burp* nate On Mon, 29 Nov 1999, Evan Moore wrote: evan >I have been reading about securing my linux box and it mentions making evan >/etc readable only by root. Would this mess up anything by making making evan >all of the /etc file permisions 600? evan > evan >thanks in advance evan >evan evan > evan > evan >-- evan >Unsubscribe? mail -s unsubscribe [EMAIL PROTECTED] < /dev/null evan > ----------------------------------------[mailto:[EMAIL PROTECTED] ]-- Vice President Network Operations http://www.firetrail.com/ Firetrail Internet Services Limited http://www.aphroland.org/ Everett, WA 425-348-7336 http://www.linuxpowered.net/ Powered By: http://comedy.aphroland.org/ Debian 2.1 Linux 2.0.36 SMP http://yahoo.aphroland.org/ -----------------------------------------[mailto:[EMAIL PROTECTED] ]-- 10:57am up 101 days, 22:37, 1 user, load average: 1.90, 1.80, 1.69