Hi James ,

I forgot to mention the 'trap' command. I use this utility on my Unixware 7
boxes ,
to prevent users from gaining access to the system using the 'delete' key ,
which by sending
a SIGINT will cause the same effect as the CONTROL C in Linux. The trap
command is
normally a Bash builtin in Linux ( At least with RH 6.2 anyhow )

Here is how you could prevent that kind of break-in :

Right at the top of the .bash_profile file :
insert the following command :

trap ' ' 2 3

( If you really want to , you could reset the defaults again using

trap 2 3 )

For all of those more paranoid users , you could add a few more extra signal
numbers to
the 2 and 3 above. In Unixware 7 , you cannot trap the 9 signal , and I
assume that the same applies for
Linux.

When it comes to Linux and Unix , I am probably the biggest idiot on this
mailing list ,
but I do imagine that the trap command will make things a little tougher
for all of those CONTROL C users ....

Regards , Jason


----- Original Message -----
From: "James P. Roberts" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, October 28, 2002 8:42 PM
Subject: Re: Menu security


> <snip>
> > I have a simple script which running a menu as below when i logon as
> > user "abc"
> >
> > A. Check Hard Disk Space
> > B. Check Mem Info
> > C. Check CPU Info
> >
> > What my question is how can I configure this user "abc" can only
> access
> > to this  menu.
> >
> <snip>
>
> Look into using a chroot jail for this user.  The other answer you got
> earlier, about executing the script automatically at login was valid,
> but not secure.  All the user would have to do is hit control-C (or the
> like) to escape from the login shell (before it finished executing and
> logged out), and then would have normal access.  You can specify the
> login shell for that user within /etc/passwd.  Set up an alternate
> "secure shell" for such users, which will chroot them to a safe place,
> where they can only execute the set of commands you include inside the
> chroot jail.
>
> Regards,
> Jim
>
>
>
> _______________________________________________
> Seawolf-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/seawolf-list



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to