- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Read only account
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-14-2002 06:59 AM
08-14-2002 06:59 AM
Read only account
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-14-2002 07:08 AM
08-14-2002 07:08 AM
Re: Read only account
Pete
Pete
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-14-2002 07:09 AM
08-14-2002 07:09 AM
Re: Read only account
Create a shell script that will allow the person to view (not vi) only the configuration files. Make it as his/her default shell.
Or you can use SUDO.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-14-2002 07:14 AM
08-14-2002 07:14 AM
Re: Read only account
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-15-2002 12:28 AM
08-15-2002 12:28 AM
Re: Read only account
knowing a lot more about your environment
and goals. Is your primary goal for something like production/quality control or for security analysis? Depending on the answer,
many of the following might not apply, but
I can't tell what your real goals are.
The 'view' reply needs to consider that
view has a shell escape (:!sh), which could
presumably be used to alter some files.
The sudo idea might work, combined with cat.(i.e. you can make a copy of any file,
into some scratch directory by running cat under sudo, then browse the file at leisure.) Combining sudo and cp would probably not be a good idea, because that would give them privilege not only for the source file but also the target file.
What is the nature of the change verification?
Is it enough to know the names, dates and checksums of files or do they actually have to look at the contents of the files to verify
the changes? I could imagine a daily cron
job that did
'find / -type f -print | xargs cksum > log_file 2>&1'
and making such a log file available by
anonymous ftp, mail, NFS export, etc. With minor changes you could add 'ls -lRt /' or
similar to the cron job to be able to see file names, sizes change dates,
permissions, etc. That might work well
for production control purposes. It's
probably not sufficient if the goal is
for generic security audits.
Other possibilities would include NFS-exporting
a read-only copy of everything (or key
directories) but that's
likely to have some practicality and security
issues in most environments. (also perhaps
file permission problems)
If you're concerned about a fairly well
defined set of files that's expected to be
constant across a number of machines,
not concerned about malicious attempts to
bypass the system, and just want to identify inconsistencies, something like 'rdist -v' might be helpful.
You might also look at www.tripwire.com.