Joe Sloan wrote:
Aaron Kulkis wrote:
Joe Sloan wrote:

I had to edit the paths even more extensively in hpux, solaris or aix -
in fact anything in /opt or /usr/local usually wasn't even in root's
path
AND THEY'RE NOT SUPPOSED TO BE!!!
That's a security risk.

Root is for ADMINISTRATIVE use, not running apps.


I'm not sure what you're getting at - are you saying it's a security
risk for root to run "top" on solaris or hpux? A shame really, one of my
favorite apps. How about linux? It's in root's path on every linux
distro I've seen.

But that is getting completely away from the point, which was that suse
provides for root a fully functional path, but removes e.g. /sbin and
/usr/sbin from the path of non-root users, which needs fixing up.


- but I expect to spend time fixing things up to make those OSes
Hat to say it, but no, you were possibly introducing
security holes into those systems.  Very few apps in
/opt or /usr/local are ever tested for safety under
root's UID.

Examples, please? What would be the security advantage of typing
"/opt/SunWzztop/bin/top" every time, instead of "top", with
/opt/SunWzztop/bin in the path?

[EMAIL PROTECTED]:~> which top
/usr/bin/top
[EMAIL PROTECTED]:~>


Why isn't top in /usr/bin where it belongs?



--
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to