Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 19 Nov 2001 10:13:14 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 19 Nov 2001 10:13:04 -0500 Received: from leibniz.math.psu.edu ([146.186.130.2]:16537 "EHLO math.psu.edu") by vger.kernel.org with ESMTP id ; Mon, 19 Nov 2001 10:12:58 -0500 Date: Mon, 19 Nov 2001 10:12:56 -0500 (EST) From: Alexander Viro To: vda cc: linux-kernel@vger.kernel.org Subject: Re: x bit for dirs: misfeature? In-Reply-To: <01111917034005.00817@nemo> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 19 Nov 2001, vda wrote: > > Trivial example: you have a directory with a bunch of subdirectories. > > You want owners of subdirectories to see them. You don't want them > > to _know_ about other subdirectories. > > Security through obscurity, that is. Huh? By the same logics /etc/shadow is security through obscurity - after all, you can try all possible passwords one by one. Ability to use key != ability to see valid keys. > Do you have even a single dir on your boxes with r!=x? Yes. Please, go to rtfm.mit.edu and find the UNIX FAQ there. Then read the relevant parts. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/