home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.security.misc:1656 comp.unix.wizards:4550
- Path: sparky!uunet!charon.amdahl.com!pacbell.com!ames!saimiri.primate.wisc.edu!zaphod.mps.ohio-state.edu!sol.ctr.columbia.edu!emory!europa.asd.contel.com!paladin.american.edu!news.univie.ac.at!blekul11!frmop11!barilvm!bimacs!yedidya
- From: yedidya@bimacs.BITNET (Yedidya Israel)
- Newsgroups: comp.security.misc,comp.unix.wizards
- Subject: Re: Setuid script - is this unsecure?
- Message-ID: <4433@bimacs.BITNET>
- Date: 5 Nov 92 19:10:55 GMT
- References: <1d6fdiINNf5q@bnsgd245.bnr.co.uk>
- Organization: Math department, Bar-Ilan University, Ramat-Gan, ISRAEL
- Lines: 24
-
- In article <1d6fdiINNf5q@bnsgd245.bnr.co.uk> rickt@bnr.co.uk (Rick Tait) writes:
- >I recently installed these shell scripts on my machine (on which I am root),
- >and I'd like to know if I'm compromising it's security. Basically, they
- >just allow the users to mount/umount/eject the floppy disk (pcfs).
-
- Did anyone tried to solve this old problem with automounter ?
- Something like (with amd)
-
- pcfs host==sunblast;type:=program;\
- mount:="/usr/etc/mount_pcfs mount_pcfs /dev/fd0 /amd.direct/pcfs nosuid";\
- unmount:="/etc/umount umount /dev/fd0"
-
- I get the following message:
-
- Nov 5 21:09:22 sunblast amd[126]/error: /amd.direct/pcfs: mount
- (afs_cont): Not owner
-
- --
- Israel Yedidya, Phone: 972-3-5318682 or 972-3-5318407/8
- System Administrator, Fax: 972-3-5353325
- Math & CS Department, Email: yedidya@bimacs.cs.biu.ac.il
- Bar-Ilan University, Bitnet: yedidya@bimacs
- Ramat-Gan, ISRAEL. Uucp: ...!uunet!pucc.princeton.edu!bimacs!yedidya
- If someone proves there is no God, I'll stop being religious!
-