Unix security additions

Peter da Silva peter at ficc.ferranti.com
Wed Apr 24 01:49:15 AEST 1991


In article <1991Apr12.101319.8523 at jarvis.csri.toronto.edu> thomson at hub.toronto.edu (Brian Thomson) writes:
> In article <PONA272 at xds13.ferranti.com> peter at ficc.ferranti.com (Peter da Silva) writes:
> >In article <19183 at rpp386.cactus.org> jfh at rpp386.cactus.org (John F Haugh II) writes:
> >> Likewise, if you can only restore
> >> files that were backed up using the special utilities, you can't just
> >> put any program you want on the system.

> >Sure: back up to tape, read tape on a non-secure system, edit it, write
> >it out again, and restore.

> You don't get a secure installation by buying a secure machine and
> putting it in a location where a user can tamper with its backup tapes.

We're not talking about random users here. We're talking about the regular
backup operators.

> Of course secure systems require physical safeguards!

Of course, but who watches the people who work behind those safeguards?
-- 
Peter da Silva.  `-_-'  peter at ferranti.com
+1 713 274 5180.  'U`  "Have you hugged your wolf today?"



More information about the Comp.unix.internals mailing list