home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.security.misc
- Path: sparky!uunet!think.com!spdcc!das-news.harvard.edu!endor!adam
- From: adam@endor.uucp (Adam Shostack)
- Subject: Re: Setuid script - is this unsecure?
- Message-ID: <1992Nov5.190532.12471@das.harvard.edu>
- Sender: usenet@das.harvard.edu (Network News)
- Organization: Aiken Computation Lab, Harvard University
- References: <1d6fdiINNf5q@bnsgd245.bnr.co.uk>
- Date: Thu, 5 Nov 1992 19:05:32 GMT
- Lines: 21
-
- In article <1d6fdiINNf5q@bnsgd245.bnr.co.uk> rickt@bnr.co.uk (Rick Tait) writes:
- >I recently installed these shell scripts on my machine (on which I am root),
- >and I'd like to know if I'm compromising it's security. Basically, they
- >just allow the users to mount/umount/eject the floppy disk (pcfs).
-
- >-rwSr-xr-x 1 root staff 368 Oct 11 11:20 in*
- >-rwSr-xr-x 1 root staff 42 Oct 23 15:05 out*
-
- Why not use sudo to allow mounting of floppy disks? It avoids the
- race condition, and is easily configured to do what you want.
-
- You can get it from csn.org:/pub/sudo
-
- Adam
-
-
-
- Adam Shostack adam@das.harvard.edu
-
- What a terrible thing to have lost one's .sig. Or not to have a .sig
- at all because of elections. How true that is.
-