>  lets be clear, you d have to check for each and every new version of
> each and every binary you ship to add this "allowed to skack exec or
> whatever other dirty memory trick"  flag whenever the upstream added a
> bug or a backdoor.

 also automatically adding this flag everywhere completely defeats the
purpose of those security patches, you just say "wow this program have
a backdoor, cool its allowed, dont even log that" to your grsec
kernel, why not ship a grsec kernel with no security options enabled
then ? or just use vanilla ;)
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to