<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable ability to run a shell script in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893498#M701030</link>
    <description>Whoops, thanks again.</description>
    <pubDate>Wed, 30 Mar 2005 16:21:16 GMT</pubDate>
    <dc:creator>Don Bentz</dc:creator>
    <dc:date>2005-03-30T16:21:16Z</dc:date>
    <item>
      <title>Disable ability to run a shell script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893491#M701023</link>
      <description>aside from the obvious permissions solution for individual script files, is there a way to simply prevent persons outside a given group from executing a script from the command line?  I realize that there are many programs (ll, cp, mv) that need to be utilized by just about anybody on the system, but I am trying to find a way to secure certain shell scripts.  We would like to be able to keep people (i.e., developers) from "launching" a production script in a similar fashion as other environments (i.e., IBM Mainframes).</description>
      <pubDate>Wed, 30 Mar 2005 15:05:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893491#M701023</guid>
      <dc:creator>Don Bentz</dc:creator>
      <dc:date>2005-03-30T15:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ability to run a shell script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893492#M701024</link>
      <description>At our site production users are a member of one group, and developers another. Then the production files only have group write access to the production users. A developer is not able to directly update the production data files.&lt;BR /&gt; &lt;BR /&gt;HTH&lt;BR /&gt; &lt;BR /&gt;-- Rod Hills</description>
      <pubDate>Wed, 30 Mar 2005 15:10:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893492#M701024</guid>
      <dc:creator>Rodney Hills</dc:creator>
      <dc:date>2005-03-30T15:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ability to run a shell script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893493#M701025</link>
      <description>You could add few lines at the beginning of the&lt;BR /&gt;script to decide. Something like:&lt;BR /&gt;&lt;BR /&gt;grp_id=$(id -g)&lt;BR /&gt;# Assuming 20 is the group id of the group &lt;BR /&gt;# you want to give execute permission&lt;BR /&gt;if [  $grp_id -ne 20 ] &lt;BR /&gt;then&lt;BR /&gt;echo "Sorry, no permission"&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;- Biswajit&lt;BR /&gt;</description>
      <pubDate>Wed, 30 Mar 2005 15:17:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893493#M701025</guid>
      <dc:creator>Biswajit Tripathy</dc:creator>
      <dc:date>2005-03-30T15:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ability to run a shell script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893494#M701026</link>
      <description>Actually what I am referring to has to do with maintaining a legitimate "change control" method, i.e., the developer "logs out" a program, makes modifications and then has the "production group" move it back to production.  I'm not sure what I can do to prevent the developer, after having made those modifications from "submitting" this script.</description>
      <pubDate>Wed, 30 Mar 2005 15:20:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893494#M701026</guid>
      <dc:creator>Don Bentz</dc:creator>
      <dc:date>2005-03-30T15:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ability to run a shell script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893495#M701027</link>
      <description>I can think of three ways:&lt;BR /&gt;A) permissions to the file&lt;BR /&gt;B) Check permisssions in the program itself - like the previous posting.  I like this one, and if you add in some trap statements, it works well.&lt;BR /&gt;C) Create a new user that can run the selected processes - and give access to these commands via sudo.  I've used this on too, and like it for secure processes.</description>
      <pubDate>Wed, 30 Mar 2005 15:21:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893495#M701027</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2005-03-30T15:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ability to run a shell script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893496#M701028</link>
      <description>What you're describing is the classic sourcecode control system and this cannot be solved with permissions. You need a reference library where code is checked-out and checked-in, along with tracked code changes (what and by whom). The classic (but tedious) Unix method is SCCS (man sccs) but I suspect that developers may not always play by the rules (that's already apparent). I assume that the production servers are immune from casual developer changes (they are, right???). If development occurs on the same machine, perhaps it would be interesting to develop a cost associated with mistakes due to lack of sourcecode controls. Then look at some commercial solutions.</description>
      <pubDate>Wed, 30 Mar 2005 16:14:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893496#M701028</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2005-03-30T16:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ability to run a shell script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893497#M701029</link>
      <description>Well, that's what I wanted to know, or more correctly, what I suspected.  Thanks, everybody.</description>
      <pubDate>Wed, 30 Mar 2005 16:17:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893497#M701029</guid>
      <dc:creator>Don Bentz</dc:creator>
      <dc:date>2005-03-30T16:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ability to run a shell script</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893498#M701030</link>
      <description>Whoops, thanks again.</description>
      <pubDate>Wed, 30 Mar 2005 16:21:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/disable-ability-to-run-a-shell-script/m-p/4893498#M701030</guid>
      <dc:creator>Don Bentz</dc:creator>
      <dc:date>2005-03-30T16:21:16Z</dc:date>
    </item>
  </channel>
</rss>

