Hacker News new | past | comments | ask | show | jobs | submit login

Why include the shell then? Just curious.



It really should be applauded, you own this thing and can fully control it, but that means you can do things with it we can’t save you from and will refuse to even try.

No need for a “security” team to lock away access from you, a very stern warning will do.


Got it, thanks!


It's really for Oracle techs to use, I guess?

Dell Compellent has a similar thing. Theirs is hidden behind the super seekrit password "SuPpOrt"...


That's a very...secure password!


Debugging maybe?

When I worked support for networking equipment every device had potentially multiple shells or APIs hidden that allowed you to do stuff that really only the engineers who made the thing should do / direct someone to do it.

I often walked trustworthy customers through using them as they knew if they did it then it was on them.


Reasonable, someone gets to use it.


Most likely for support engineers working on "something went really wrong" cases to be able to provide you with debug commands that you should run, or for support engineers to be able to run such commands.


For Sun (later, Oracle) support staff to access remotely (with the customer's approval).


Apparently, you didn't read the message.


No I did, just not sophiscated to understand all of that. My basic understanding is that they put something in the piece of software that users should absolutely not touch, that's why I asked why it absolutely has be there.

That is, is there any chance that they can remove it from the hand of users without damaging the usability of that piece of software. The other commenters mentioned that support engineers may use it, so that answered my question.




Consider applying for YC's W25 batch! Applications are open till Nov 12.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: