Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Visit the research computing environment sometime, for instance. The libzma SSH compromise was considered very worrying, after all.


That didn't need multi-users.


No, but that's the case I've overwhelmingly seen over the decades. Anyway, are you going to redesign ssh not to require a user, for instance? I assume you wouldn't want sshd running as the putative single user.

[I'm all for replacing notions of privileges/permissions with capabilities.]


Yes, i'd rather that the sshd daemon ran with a restricted set of capabilities.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: