10-03-2011
Why not sudo? That'd give you much closer control of what exactly he's allowed to with what program and parameters, as what user.
If it needs to be seamless, you could give him an alias...
This User Gave Thanks to Corona688 For This Post:
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have a C wrapper programme which basically execute a shell script. The shell script has 700 as permission and oracle is owner of the shell script.
The C execuatble has 4711 permission so that means that it has setuid bit set and group and others can execute the C executable.
The reason why I am... (2 Replies)
Discussion started by: sanjay92
2 Replies
2. UNIX for Dummies Questions & Answers
Hi,
I have been looking at setuid and setgid.
I understand that setuid determines who owns the file and setgid determines which group of people can access the file... yeah?!
But i need to know how to actually use setuid and setgid. I'm guessing chmod will feature somewhere..
Any help... (1 Reply)
Discussion started by: crispy
1 Replies
3. UNIX for Advanced & Expert Users
Hi,
This question deals with Solaris 2.8 and setuid programs. From research I've done so far, setuid programs ignore LD_LIBRARY_PATH; I've proven this and am OK with it. The thing I am not certain of how the C compiler is supposed to behave when it is invoked via a setuid program. Basically,... (0 Replies)
Discussion started by: WolfBoy
0 Replies
4. UNIX for Dummies Questions & Answers
could u plz give me clear idea of spcial permissions setuid,getuid and striky bit . (1 Reply)
Discussion started by: Prem
1 Replies
5. Solaris
Hi All,
Can someone give me some info about setuid or guid topic? Also about sticky bit.
Thanks in advance,
itik (9 Replies)
Discussion started by: itik
9 Replies
6. UNIX Desktop Questions & Answers
I would like to list files with setuid and setgid set up. I used the find command, but I got a lot of permission denied error. I tried to redirect the error to the hole it does not work. I used the command string below
find . -type f \( -perm -4000 -o -perm -2000 \) -exec ls {} \; 2>/dev/null... (3 Replies)
Discussion started by: Pouchie1
3 Replies
7. AIX
Guy's
I'm trying to add some lines in sudo by useing this command visudo
# User privilege specification
root ALL=(ALL) ALL
# Uncomment to allow people in group wheel to run all commands
# %wheel ALL=(ALL) ALL
# Same thing without a password
# %wheel ALL=(ALL) NOPASSWD: ALL
#... (5 Replies)
Discussion started by: ITHelper
5 Replies
8. HP-UX
Hi All,
How to prevent root user from doing setuid().
In otherwords, if the root(any user) is trying to do setuid in a program it should fail. (5 Replies)
Discussion started by: guru13
5 Replies
9. UNIX for Beginners Questions & Answers
Just learning about the privilege escalation method provided by setuid. Correct me if I am wrong but what it does is change the uid of the current process to whatever uid I set. Right ?
So what stops me from writing my own C program and calling setuid(0) within it and gaining root privileges ?
... (2 Replies)
Discussion started by: sreyan32
2 Replies
10. Shell Programming and Scripting
I'm trying - as an ordinary user - to create a file in the root directory of my system. For that purpose I wrote a simple script that echoes a string into a file. I made the file executable, used sudo to change ownership to root. Like this:
$ cat hello
#!/bin/bash
echo hello > /hello
$... (5 Replies)
Discussion started by: Ralph
5 Replies
LEARN ABOUT ULTRIX
conflict
conflict(8mh) conflict(8mh)
Name
conflict - search for alias/password conflicts
Syntax
/usr/lib/mh/conflict [ -help ] [ -mail name ] [ -search directory ] [ aliasfiles ... ]
Description
The program checks to see if the interface between MH and transport system is in good shape. It also checks for maildrops in which do not
belong to a valid user. It assumes that no user name will start with a dot (.) and thus ignores files in which begin with a dot.
The program checks the entries in the specified alias files. It parses the entries in the same way that would, and outputs any errors
which it finds. The program can be used to check the entries in a user's personal alias file, or in the system alias file, If no alias
file is specified, checks the system alias file.
The program also checks the file for entries which do not belong to a valid user, and for users who do not have a valid group number. In
addition, duplicate users and groups are noted.
The program should be run under or whenever system accounting takes place.
Options
-help Prints a list of the valid options to this command.
-mail name
Mails the results to the specified name. Otherwise, the results are sent to the standard output.
-search directory
Searches directories other than and reports anomalies in those directories. The -search switch can appear more than once in an
invocation to with different directories named.
Files
The system customization file.
The system password file.
The system group file.
Program used to mail results, if the
-mail option is used.
Directory containing users' maildrops.
See Also
mh-alias(5mh), cron(8)
conflict(8mh)