*BSD News Article 50912


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!simtel!swidir.switch.ch!newsfeed.ACO.net!Austria.EU.net!EU.net!Germany.EU.net!news.dfn.de!gs.dfn.de!fauern!news.tu-chemnitz.de!irz401!uriah.heep!bonnie.heep!not-for-mail
From: j@bonnie.heep.sax.de (J Wunsch)
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: Re: "chmod u+s" problem
Date: 14 Sep 1995 12:05:30 +0200
Organization: Private U**x site, Dresden.
Lines: 17
Message-ID: <438upa$cjc@bonnie.tcd-dresden.de>
References: <433ti2$96r@advocaat.dd.sigma.se> <435g2a$s87@raffles.technet.sg>
Reply-To: joerg_wunsch@uriah.heep.sax.de
NNTP-Posting-Host: 192.109.108.139
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit

James Seng <jseng@technet.sg> wrote:

>Oh no! Lets not start a long threat of "Setuid Script" here please.
>
>Please read the FAQ for comp.security.unix. The answer is all there.
>In short, setuid script are not allowed.

You can create setuid Perl scripts if you like (and put
#!/usr/bin/suidperl in the very first line).

Perl will tell you about your security holes. :-)

-- 
cheers, J"org                      private:   joerg_wunsch@uriah.heep.sax.de
                                   http://www.sax.de/~joerg/

Never trust an operating system you don't have sources for. ;-)