On Fri, 2008-12-05 at 20:29 -0500, Steve Grubb wrote: > These are required to be this way for our Common Criteria evaluations. Is the thought here that if the code can be executed by a non-root user, the audit of the code would have to be far more strict? If you keep the user from being able to execute, you don't have to worry as much about how they might exploit it? I'm just curious what added security you really get. -- Jesse Keating Fedora -- Freedom² is a feature! identi.ca: http://identi.ca/jkeating
Attachment:
signature.asc
Description: This is a digitally signed message part
-- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list