12-09-2013
It's worse than that -- the program runs the code through sh ultimately, so substituting a false sh can get the code directly.
Many people have been down this road before. Rube goldberg machines are not and cannot be the solution.
In short, if you don't want the customer to see the code, you can try either
1) Don't give it to them -- make it a service they access over the network
or
2) Put it on a machine you control, where they do not have root, and deny them access via file access permissions and isolate it further with sudo.
You cannot expect to protect a program by encryption when, by definition, the program contains the necessary code to decrypt itself in unencrypted form.
You cannot expect to protect anything run in plaintext from root.
If you rewrote your application in a language like C, decoding it would be a lot harder since quite a lot of information is thrown away in the compiling/linking process.
Last edited by Corona688; 12-09-2013 at 11:45 AM..
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi All,
I want to make my script password protected.
i e: if somebody runs my script it should prompt for password.
Can somebody help me in to execute the same??
Thanks in Advance :b: (11 Replies)
Discussion started by: achararun
11 Replies
2. OS X (Apple)
I'm making a script that will be a double clickable .command file and I need it to prompt for the users admin password.
So far I have:
if ]; then
sudo -p "Please enter your admin password: " date 2>/dev/null 1>&2
if ; then
echo "You entered an invalid password... (2 Replies)
Discussion started by: PatGmac
2 Replies
3. Shell Programming and Scripting
Any idea how to make files/folders password protected...
I dont want to change the permissions of the files/folders... (1 Reply)
Discussion started by: know d unknown
1 Replies
4. Shell Programming and Scripting
Hi all,
I am running this script on Mandrakelinux release 10.1, 2.6.8.1-12mdksmp #1 SMP
I have also installed 'expect' separately.
I have created an Rsync script, but before any Rsync command does run, a MySql dump must be done first, and I am battling a bit to pass the MySql password from... (2 Replies)
Discussion started by: codenjanod
2 Replies
5. Shell Programming and Scripting
Dear folks,
The title of my thread says mostly all of what I want to do. Basically I want to auto-ssh to a remote host, and run a program on it (VLC is just an example). I wrote a script which calls xterm and then runs expect on it. The code is as follow
#!/bin/bash
export PASS="xxxxxxx"... (22 Replies)
Discussion started by: dukevn
22 Replies
6. Shell Programming and Scripting
Hi all,
I'm a complete newbie to bash scripting, although I have some experience in programming. The thing is that I have a .dmg file on my mac which I protected with a password, and now I've forgotten it.
I remember the first few letters of the password and the characters that represent the... (4 Replies)
Discussion started by: sujay.jauhar
4 Replies
7. Shell Programming and Scripting
Hello
I am doing some test.
In a script I have to call a change password routine ( ldap ) which ask confirmation. This can be done from terminal.
Is there a way to do something like this :
#!/bin/bash
#
blabla
blabla
blabla
blabla
# changing_password_routine user_name... (2 Replies)
Discussion started by: jcdole
2 Replies
8. Shell Programming and Scripting
Is there a way to mask the password inside of a script to minimize the impact of a comprimised server? So
ssh -o "PasswordAuthentication no" -o "HostbasedAuthentication yes" -l testuser 192.168.3.1 "mysqldump --opt --all-databases -u root -pPassword| gzip" > $backup_dir/mysqldump.gz
a... (2 Replies)
Discussion started by: metallica1973
2 Replies
9. Shell Programming and Scripting
password check in bash script calling on expect
Background: I have to copy a file from one server, to over 100 servers in a test environment. once the file is copied, it requires to have the permissions on the file changed/verified. These are all linux servers. most of them have the same... (1 Reply)
Discussion started by: 2legit2quit
1 Replies
10. Shell Programming and Scripting
I am super new to scripting and I am trying to create a bash script that is interactive that will change other user passwords as well as a few other thing (ie. change SMB pw, see pw expiration,lock/unlock user).
I have started it by making it check to see if the username entered is in the... (2 Replies)
Discussion started by: thumbelina
2 Replies
LEARN ABOUT DEBIAN
xpaacl
xpaacl(7) SAORD Documentation xpaacl(7)
NAME
XPAAcl - Access Control for XPA Messaging
SYNOPSIS
XPA supports host-based access control for each XPA access point. You can enable/disable access control using the XPA_ACL environment
variable. You can specify access to specific XPA access points for specific machines using the XPA_DEFACL and XPA_ACLFILE environment vari-
ables. By default, an XPA access point is accessible only to processes running on the same machine (same as X Windows).
DESCRIPTION
When INET sockets are in use (the default, as specified by the XPA_METHOD environment variable), XPA supports a host-based access control
mechanism for individual access points. This mean that access can be specified for get, set, or info operations for each access point on a
machine by machine basis. For LOCAL sockets, access is restricted (by definition) to the host machine.
XPA access control is enabled by default, but can be turned off by setting the XPA_ACL environment variable to false. In this case, any
process can access any XPA server.
Assuming that access control is turned on, the ACL for an individual XPA access point is set up when that access point is registered
(although it can be changed later on; see below). This can be done in one of two ways:
Firstly, the XPA_ACLFILE environment variable can defined to point to a file of access controls for individual access points. The format of
this file is:
class:name ip acl
The first argument is a template that specifies the class:name of the access point covered by this ACL. See XPA Access Points and Templates
for more information about xpa templates.
The second argument is the IP address (in human-readable format) of the machine which is being given access. This argument can be * to
match all IP addresses. It also can be $host to match the IP address of the current host.
The third argument is a string combination of s, g, or i to allow xpaset, xpaget, or xpainfo access respectively. The ACL argument can be
+ to give sgi access or it can be - to turn off all access.
For example,
*:xpa1 somehost sg
*:xpa1 myhost +
* * g
will allow processes on the machine somehost to make xpaget and xpaset calls, allow processes on myhost to make any call, and allow all
other hosts to make xpaget (but not xpaset) calls.
Secondly, if the XPA_ACLFILE does not exist, then a single default value for all access points can be specified using the XPA_DEFACL envi-
ronment variable. The default value for this variable is:
#define XPA_DEFACL "*:* $host +"
meaning that all access points are fully accessible to all processes on the current host. Thus, in the absence of any ACL environment vari-
ables, processes on the current host have full access to all access points created on that host. This parallels the X11 xhost mechanism.
Access to an individual XPA access point can be changed using the -acl parameter for that access point. For example:
xpaset -p xpa1 -acl "somehost -"
will turn off all access control for somehost to the xpa1 access point, while:
xpaset -p XPA:xpa1 -acl "beberly gs"
will give beberly xpaget and xpaset access to the access point whose class is XPA and whose name is xpa1.
Similarly, the current ACL for a given access point can be retrieved using:
xpaget xpa1 -acl
Of course, you must have xpaget access to this XPA access point to retrieve its ACL.
Note that the XPA access points registered in the xpans program also behave according to the ACL rules. That is, you cannot use xpaget to
view the access points registered with xpans unless you have the proper ACL.
Note also when a client request is made to an XPA server, the access control is checked when the initial connection is established. This
access in effect at this time remains in effect so long as the client connection is maintained, regardless of whether the access fro that
XPA is changed later on.
We recognize that host-based access control is only relatively secure and will consider more stringent security (e.g., private key) in the
future if the community requires such support.
SEE ALSO
See xpa(7) for a list of XPA help pages
version 2.1.14 June 7, 2012 xpaacl(7)