home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!usc!howland.reston.ans.net!wupost!cs.utexas.edu!sun-barr!olivea!spool.mu.edu!umn.edu!csus.edu!netcom.com!horen
- From: horen@netcom.com (Jonathan B. Horen -- [408] 736-3923)
- Newsgroups: comp.sys.sun.admin
- Subject: Re: mounting CD by normal user. Alternatives to suid shell script
- Keywords: Cd mount, suid shell script, security
- Message-ID: <1992Dec12.003509.22601@netcom.com>
- Date: 12 Dec 92 00:35:09 GMT
- References: <1992Dec11.211807.29122@u.washington.edu>
- Organization: NetCom -- OnLine Communication Services
- Lines: 20
-
- In article <1992Dec11.211807.29122@u.washington.edu> axel@apl.Washington.EDU (axel schweiger) writes:
- >Can anyone explain to me why suid shell scripts are such a security
- >risk and if so how do people accomplish mounting cds and M/O drives
- >by non-super users. Has anyone dealt with that ?
-
- Rather than giving everybody the root password, we chose to allow certain
- users the ability to perform certain commands on certain workstations,
- via "sudo".
-
- You can anonymously ftp it from:
-
- boulder.colorado.edu:/pub/sa-book/sudo.v1.2.tar.Z
-
- I heartily recommend it -- it helps me to work "smart", rather than "hard",
- and it empowers users (for which they will forever be in your debt :-)
-
-
- Jonathan B. Horen
- Sun System Administrator/Sr. Technical Writer
- tel: (408) 736-3923 | email: horen@netcom.com
-