Those are good ideas to push the concept even further.
But this was a mindgame anyway. In answer to what Maguro said:
Yes, it would still be possible to root the system, but how would that
help to get another user?
Even if the system is rooted you would only have access to your own
files and could
On Sun, 17 Sep 2006 13:38:32 +0200, Paul Sebastian Ziegler said:
As you said this requires that the AFS-Server is being kept up to date.
But the Images wouldn't have to be. Apart from this AFS hasn't had a
major security-issue in the past several years.
AFS hasn't had a magor security issue
On 9/17/06, Paul Sebastian Ziegler [EMAIL PROTECTED] wrote:
Yes, it would still be possible to root the system, but how would that
help to get another user?
As someone else in this thread pointed out, usability is probably a
more important concern than security with this system design. As an
On Sep 17, 2006, at 10:03 , [EMAIL PROTECTED] wrote:
Go back and re-read the last few batches of AFS updates, and ask
youself
for each bugfix Could this *potentially* have been leveraged by a
clued
hacker?.
I haven't noticed many issues beyond potential denial of service
attacks ---
On Sep 17, 2006, at 11:05 , Brian Eaton wrote:
As you said this requires that the AFS-Server is being kept up to
date.
But the Images wouldn't have to be. Apart from this AFS hasn't had a
major security-issue in the past several years.
This is odd. MIT kerberos releases security patches
I know that bruteforcing subdomains is nothing new, and I also know
that there are at least 3 tools out there that allow you to do this
(probably many many more :-D ). However, I couldn't find a subdomain
bruteforcer that allows me to:
- obtain *all* IP addresses (A records) associated to each