<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: suid in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430812#M2968</link>
    <description>thanks.....</description>
    <pubDate>Fri, 14 Jul 2000 14:13:18 GMT</pubDate>
    <dc:creator>f. halili</dc:creator>
    <dc:date>2000-07-14T14:13:18Z</dc:date>
    <item>
      <title>suid</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430808#M2964</link>
      <description>Any brief idea about suid???&lt;BR /&gt;Any good docs discussing suid??&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Jul 2000 13:05:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430808#M2964</guid>
      <dc:creator>f. halili</dc:creator>
      <dc:date>2000-07-14T13:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: suid</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430809#M2965</link>
      <description>Are you talking about Sybase? or HPUX?</description>
      <pubDate>Fri, 14 Jul 2000 13:13:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430809#M2965</guid>
      <dc:creator>Philip Chan_1</dc:creator>
      <dc:date>2000-07-14T13:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: suid</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430810#M2966</link>
      <description>suid scripts are fairly risky to say the least. If they are not carefully coded, they can be broken out of giving a normal user root capability. &lt;BR /&gt;A much better approach to suid scripts/programs is to use the software sudo. A package to allow commands to be run as the superuser. Sudo determines who is an authorised user by consulting your /etc/sudoers database. The program prompts for a user's password to initiate a validation period of N minutes, here N is defined at installation time. N.B. There is no easy way to prevent a user from gaining a root shell if he has access to commands that are shell scripts or that allow shell escapes.&lt;BR /&gt;This is available at the Software Porting And Archive Centre for HP-UX:&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/" target="_blank"&gt;http://hpux.cs.utah.edu/&lt;/A&gt;    or&lt;BR /&gt;&lt;A href="http://hpux.cae.wisc.edu/" target="_blank"&gt;http://hpux.cae.wisc.edu/&lt;/A&gt;    or&lt;BR /&gt;&lt;A href="http://hpux.connect.org.uk/" target="_blank"&gt;http://hpux.connect.org.uk/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Brian&lt;BR /&gt;&amp;lt;*(((&amp;gt;&amp;lt; er&lt;BR /&gt;</description>
      <pubDate>Fri, 14 Jul 2000 13:18:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430810#M2966</guid>
      <dc:creator>Brian M. Fisher</dc:creator>
      <dc:date>2000-07-14T13:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: suid</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430811#M2967</link>
      <description>See ITRC Knowledge Base document id A5555024 "Sys Adm: general suid questions-permissions and user classes" for an explanation of SUID.&lt;BR /&gt;&lt;BR /&gt;See also "Essential System Administration" in the O'Reilly series of UNIX books, Chapter 6: Security.</description>
      <pubDate>Fri, 14 Jul 2000 13:21:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430811#M2967</guid>
      <dc:creator>Cheryl Griffin</dc:creator>
      <dc:date>2000-07-14T13:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: suid</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430812#M2968</link>
      <description>thanks.....</description>
      <pubDate>Fri, 14 Jul 2000 14:13:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430812#M2968</guid>
      <dc:creator>f. halili</dc:creator>
      <dc:date>2000-07-14T14:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: suid</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430813#M2969</link>
      <description>Don't forget that setting the suid bit only suid's for file permissions.  It will not work for commands.  Lately I have been using SAMs ability to allow custom menus and applications to run as root for example.  This basically is the same as "sudo" but comes included with HPUX instead of another 3rd party app to be administered.  I use this to allow operators to run backups as root and help desk persons to reset non-root user passwords.  The scripts you write that are called upon by the restricted SAM MUST be secure and fool proof.</description>
      <pubDate>Sat, 22 Jul 2000 10:49:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/suid/m-p/2430813#M2969</guid>
      <dc:creator>Tim Nelson</dc:creator>
      <dc:date>2000-07-22T10:49:20Z</dc:date>
    </item>
  </channel>
</rss>

