home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cis.ohio-state.edu!zaphod.mps.ohio-state.edu!saimiri.primate.wisc.edu!crdgw1!rdsunx.crd.ge.com!ariel!davidsen
- From: davidsen@ariel.crd.GE.COM (william E Davidsen)
- Newsgroups: comp.unix.shell
- Subject: Re: How to make Restrict Shell more safely?
- Message-ID: <1993Jan5.165446.15449@crd.ge.com>
- Date: 5 Jan 93 16:54:46 GMT
- References: <cslee.225.726145569@pds.nchu.edu.tw> <1993Jan4.194925.7364@crd.ge.com> <1993Jan4.200035.7840@crd.ge.com> <1ibbd7INNiml@mudos.ann-arbor.mi.us>
- Sender: usenet@crd.ge.com (Required for NNTP)
- Reply-To: davidsen@crd.ge.com (bill davidsen)
- Organization: GE Corporate R&D Center, Schenectady NY
- Lines: 15
- Nntp-Posting-Host: ariel.crd.ge.com
-
- In article <1ibbd7INNiml@mudos.ann-arbor.mi.us>, mju@mudos.ann-arbor.mi.us (Marc Unangst) writes:
- | In article <1993Jan4.200035.7840@crd.ge.com> davidsen@crd.ge.com (bill davidsen) writes:
- | >Followups please note any major holes in this (I've run it for years, so
- | >I probably have a fix I didn't mention).
- |
- | Hmm. Is vi part of the /guest/bin environment? If so, all the user
- | has to do is "vi foo", then do ":set shell=/bin/sh" and ":!/bin/sh".
- | Presto, they have an unrestricted shell.
-
- I mentioned this in item 4, you need to determine the security of each
- program in bin.
-
- --
- bill davidsen, GE Corp. R&D Center; Box 8; Schenectady NY 12345
- Keyboard controller has been disabled, press F1 to continue.
-