From owner-freebsd-security Fri Oct 23 14:04:48 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA10032 for freebsd-security-outgoing; Fri, 23 Oct 1998 14:04:48 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from gate.az.com ([206.63.203.18]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA10021 for ; Fri, 23 Oct 1998 14:04:46 -0700 (PDT) (envelope-from yankee@gate.az.com) Received: (from yankee@localhost) by gate.az.com (8.8.5/8.8.5) id NAA00502; Fri, 23 Oct 1998 13:43:40 -0700 (PDT) Date: Fri, 23 Oct 1998 13:43:40 -0700 (PDT) From: "Dan Seafeldt, AZ.COM System Administrator" To: freebsd-security@FreeBSD.ORG Subject: SUID variations In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Has anyone thought of (or is already being done) a file in /etc which contains a list of special users who, when a root process does a SUID to that user and begins execution of the program as that user the kernel simultaneously also does a CHROOT to a branch of the file system also specified in the /etc file? To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message