home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.unix.admin
- Path: sparky!uunet!wupost!sdd.hp.com!caen!destroyer!wsu-cs!uts.cc.wayne.edu!tom
- From: tom@uts.cc.wayne.edu (Thomas Richard Stevenson)
- Subject: Re: Prevent user from editing /etc/passwd
- Message-ID: <1992Aug20.194704.16718@uts.cc.wayne.edu>
- Organization: Wayne State Univ.
- References: <1992Aug20.165851.13565@csus.edu>
- Date: Thu, 20 Aug 1992 19:47:04 GMT
- Lines: 17
-
- tching@target.water.ca.gov (Tracy Ching <SysAdmin>) writes:
-
- > I'm in the same boat. The person must have root priv because
- >of "network testing" (he knows nothing of unix but my boss says he
- >must use the machine to configure x-win.) It -is- a social admin
- >issue, but I also must do something to protect the integrity of the
- >machine. I see some have mentioned pub domain "sudo". Will this solve
- >the problem?
- sudo id great. We use it all of the time. We did notice one small problem
- on our system. sudo couldn't be used on scripts, only on binary (object)
- files. The way we got around that was to create a small c program that
- called the script we wanted to run. We then give sudo access to the c
- program, and everything worked great. This also has a side benefit. Just
- because we want to give access to some command doesn't mean we want to give
- access to all of the options of the command. By creating a c program that
- calls the priv command with just the options we want, we have the best of
- all worlds.
-