From owner-freebsd-hackers Tue Oct 15 08:33:17 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id IAA14915 for hackers-outgoing; Tue, 15 Oct 1996 08:33:17 -0700 (PDT) Received: from godzilla.zeta.org.au (godzilla.zeta.org.au [203.2.228.19]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id IAA14887 for ; Tue, 15 Oct 1996 08:32:10 -0700 (PDT) Received: (from bde@localhost) by godzilla.zeta.org.au (8.7.6/8.6.9) id BAA14633; Wed, 16 Oct 1996 01:27:29 +1000 Date: Wed, 16 Oct 1996 01:27:29 +1000 From: Bruce Evans Message-Id: <199610151527.BAA14633@godzilla.zeta.org.au> To: freebsd-hackers@FreeBSD.ORG, j@uriah.heep.sax.de Subject: Re: /sbin/init permission Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk >> -r-sr-x--- 1 root operator 12288 Oct 2 04:26 /sbin/shutdown > >This one makes sense: any member of group `operator' is allowed to >shutdown the system, but nobody else. It makes no sense for it to be unreadable. >> ---s--x--x 2 root bin 286720 Oct 2 04:19 /usr/bin/sperl4.036 >> ---s--x--x 2 root bin 286720 Oct 2 04:19 /usr/bin/suidperl > >Old paranoia. SysV UUCP's used to ship with this set of permissions, >too. Basically useless if /usr/src is also on the system. :) Really if the user can files and execute chmod. >> -r-sr-x--- 1 uucp uucp 90112 Oct 2 04:09 /usr/libexec/uucp/uuxqt > >Seems to make sense. It makes no sense for it to be unreadable, and its nonreadability and nonexecutability by `other' breaks the usability of an nfs-mounted /usr (for the rare case that root wants to run this directly). (If it were only readable, then root could copy it and run the copy.) Bruce