home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
kermit.columbia.edu
/
kermit.columbia.edu.tar
/
kermit.columbia.edu
/
newsgroups
/
misc.19981211-19990422
/
000100_news@newsmaster….columbia.edu _Thu Jan 7 11:06:14 1999.msg
< prev
next >
Wrap
Internet Message Format
|
1999-04-21
|
2KB
Return-Path: <news@newsmaster.cc.columbia.edu>
Received: from newsmaster.cc.columbia.edu (newsmaster.cc.columbia.edu [128.59.35.30])
by watsun.cc.columbia.edu (8.8.5/8.8.5) with ESMTP id LAA11735
for <kermit.misc@watsun.cc.columbia.edu>; Thu, 7 Jan 1999 11:06:14 -0500 (EST)
Received: (from news@localhost)
by newsmaster.cc.columbia.edu (8.8.5/8.8.5) id LAA15357
for kermit.misc@watsun; Thu, 7 Jan 1999 11:06:13 -0500 (EST)
Path: newsmaster.cc.columbia.edu!watsun.cc.columbia.edu!fdc
From: fdc@watsun.cc.columbia.edu (Frank da Cruz)
Newsgroups: comp.protocols.kermit.misc
Subject: Re: Using kermit when not logged in as root
Date: 7 Jan 1999 16:06:12 GMT
Organization: Columbia University
Lines: 26
Message-ID: <772m1k$mmb$1@apakabar.cc.columbia.edu>
References: <76vso2$bc8$1@newnews.global.net.uk> <772hrt$kg3$1@apakabar.cc.columbia.edu> <3694D226.C9B0CD7F@globalnet.co.uk> <772l3o$q1j$1@samba.rahul.net>
NNTP-Posting-Host: watsun.cc.columbia.edu
Xref: newsmaster.cc.columbia.edu comp.protocols.kermit.misc:9730
In article <772l3o$q1j$1@samba.rahul.net>, <dold@network.rahul.net> wrote:
: Tim Hedger (hedger@globalnet.co.uk) wrote:
: : Whilst I'm happy that this now works, I'm still not clear how minicom
: : (which worked all along under this non-root user) works? (given that it
: : has the same permissions as the kermit executable, and it too uses
: : /dev/modem)
:
: Does Linux have a "trusted user" database, similar to UnixWare?
: UnixWare has a database of users that are allowed to do various things, so
: that minicom might be allowed access to certain devices, without the
: obvious unix permissions that are readily visible.
:
: A "properly installed" minicom would then be different from a kermit that
: had been copied into place, with no attention paid to the user database.
:
: I forget the admin tool for trusted users, but I think it is around
: /etc/security/* and creatiadb(1M).
:
But surely that would still not allow a trusted user access to files or
devices without permission. Rather, I presume it would prevent access to
resources to which one would normally have permission, if one were not on
the access list.
Tim, perhaps you could show us an ls -ldga listing of the minicom executable.
- Frank