home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.unix.sysv386
- Path: sparky!uunet!elroy.jpl.nasa.gov!usc!wupost!spool.mu.edu!yale.edu!jvnc.net!primerd.prime.com!nt1l!nt1l!aardvark
- From: aardvark@nt1l.krl.com (Donald Koch)
- Subject: Re: setuid traceroute?
- Message-ID: <1992Sep6.142438@nt1l.krl.com>
- Sender: aardvark@nt1l (Donald Koch)
- Nntp-Posting-Host: nt1l
- Organization: Koch Research Labs
- References: <14879@mindlink.bc.ca>
- Date: Sun, 6 Sep 1992 18:24:38 GMT
- Lines: 21
-
- In article <14879@mindlink.bc.ca>, Frank@mindlink.bc.ca (Frank I. Reiter) writes:
- > When a non-superuser attempts to run traceroute under SCO Unix the result is:
- >
- > traceroute: icmp socket: Permission denied
- >
- > I am considering making this program setuid root. Are there any side effects I
- > should consider before doing this?
-
- Only one I can think of (from the source):
- * Notes
- * -----
- * This program must be run by root or be setuid. (I suggest that
- * you *don't* make it setuid -- casual use could result in a lot
- * of unnecessary traffic on our poor, congested nets.)
-
- You might consider making it setuid root, but restricting access to it to
- a particular group.
-
- --
- Don Koch
- aardvark@nt1l.krl.com
-