<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Giving a script root access in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451170#M11057</link>
    <description>To reiterate the issues about security: set user-ID scripts for root access are the worst security hole you can provide.  It is quite easy to subvert a script by interrupting it or change the environment in which it runs to gain super user privileges.&lt;BR /&gt;&lt;BR /&gt;Strongly reconsider the use of scripts and instead, write a program with appropriate precautions.  Executables are much more secure in a suid application.</description>
    <pubDate>Sat, 07 Oct 2000 04:33:00 GMT</pubDate>
    <dc:creator>Bill Hassell</dc:creator>
    <dc:date>2000-10-07T04:33:00Z</dc:date>
    <item>
      <title>Giving a script root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451166#M11053</link>
      <description>I created a script, containing the statement&lt;BR /&gt;chown user myfile&lt;BR /&gt;to change the owner of a file that I am not owner of. I set the s-bit of the script file and tried to execute the script as an ordinary user. I got the messsage:&lt;BR /&gt;myfile: not owner&lt;BR /&gt;&lt;BR /&gt;setting the s-bit of a chown works fine.&lt;BR /&gt;What's wrong?&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Oct 2000 14:19:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451166#M11053</guid>
      <dc:creator>Ullrich Rieger</dc:creator>
      <dc:date>2000-10-06T14:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Giving a script root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451167#M11054</link>
      <description>Is the first line of your script:-&lt;BR /&gt;&lt;BR /&gt;#!/usr/bin/sh&lt;BR /&gt;or &lt;BR /&gt;#!/usr/bin/ksh&lt;BR /&gt;&lt;BR /&gt;This is required to get setuid to work with a script. Test it by getting the script to execute 'id'.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;John</description>
      <pubDate>Fri, 06 Oct 2000 14:21:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451167#M11054</guid>
      <dc:creator>John Palmer</dc:creator>
      <dc:date>2000-10-06T14:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: Giving a script root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451168#M11055</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;For what it's worth, here's two comments.&lt;BR /&gt;&lt;BR /&gt;Of course, remember the dangers associated with suid scripts.  You'll certainly be asked to explain where and why you have them by an auditor.&lt;BR /&gt;&lt;BR /&gt;Also, depending on the commands you are using within your scirpt, you'll probably need/want to to specify absolute paths.  Root's default PATH includes /usr/sbin where common user's don't (and don't need to).&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Fri, 06 Oct 2000 14:40:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451168#M11055</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2000-10-06T14:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Giving a script root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451169#M11056</link>
      <description>Also -- please remember to trap escape sequences in your script.  You do not want to allow a user to gain a root shell simply by hitting CTRL-c.</description>
      <pubDate>Fri, 06 Oct 2000 19:33:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451169#M11056</guid>
      <dc:creator>Alan Riggs</dc:creator>
      <dc:date>2000-10-06T19:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: Giving a script root access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451170#M11057</link>
      <description>To reiterate the issues about security: set user-ID scripts for root access are the worst security hole you can provide.  It is quite easy to subvert a script by interrupting it or change the environment in which it runs to gain super user privileges.&lt;BR /&gt;&lt;BR /&gt;Strongly reconsider the use of scripts and instead, write a program with appropriate precautions.  Executables are much more secure in a suid application.</description>
      <pubDate>Sat, 07 Oct 2000 04:33:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/giving-a-script-root-access/m-p/2451170#M11057</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2000-10-07T04:33:00Z</dc:date>
    </item>
  </channel>
</rss>

