*BSD News Article 72101


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!news.rmit.EDU.AU!news.unimelb.EDU.AU!munnari.OZ.AU!metro!metro!asstdc.scgt.oz.au!nsw.news.telstra.net!act.news.telstra.net!psgrain!usenet.eel.ufl.edu!news.ultranet.com!zombie.ncsc.mil!news.mathworks.com!newsfeed.internetmci.com!hunter.premier.net!netnews.worldnet.att.net!ix.netcom.com!netcom.net.uk!dispatch.news.demon.net!demon!awfulhak.demon.co.uk!awfulhak.demon.co.uk!awfulhak.demon.co.uk!not-for-mail
From: brian@awfulhak.demon.co.uk (Brian Somers)
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: Re: disabling user executables?
Date: 22 Jun 1996 19:03:11 +0100
Organization: Coverform Ltd.
Lines: 14
Message-ID: <4qhcgv$md@anorak.coverform.lan>
References: <4q7gv6$1d2@itchy.serv.net>
X-NNTP-Posting-Host: awfulhak.demon.co.uk
X-Newsreader: TIN [version 1.2 PL2]

Sean T. Lamont (zeno@serv.net) wrote:
: Has someone made a kernel patch which disables executing programs
: that aren't root-owned?

This is a strange question... wouldn't you be better off asking if
there's a restricted shell for FreeBSD.

If you really want to fail execs of non-root owned files, you could
have a look at doing something with *uap->argv and imgp->attr in
execve() in /sys/kern/kern_exec.c

--
Brian <brian@awfulhak.demon.co.uk>
Don't _EVER_ lose your sense of humour....