Date: Thu, 13 Mar 1997 04:48:57 -0800 (PST) From: phillip@pm.cse.rmit.edu.au To: freebsd-gnats-submit@freebsd.org Subject: docs/2978: "man 5 passwd" suggests use of a shell script for (INSECURE) messaging Message-ID: <199703131248.EAA25660@freefall.freebsd.org> Resent-Message-ID: <199703131250.EAA25709@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 2978 >Category: docs >Synopsis: "man 5 passwd" suggests use of a shell script for (INSECURE) messaging >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Class: doc-bug >Submitter-Id: current-users >Arrival-Date: Thu Mar 13 04:50:01 PST 1997 >Last-Modified: >Originator: Phillip Musumeci >Organization: RMIT Computer Systems Eng. Dept. >Release: 3.0 SNAP (January 1997), 2.1.5R, 2.1.6R >Environment: 3.0-970114-SNAP >Description: shells remapped and therefore be denied access. All other NIS password records will be ignored. The administrator may add a wildcard entry to the end of the list such as: +:::::::::/usr/local/bin/go_away <snip> /usr/local/bin/go_away can be a short shell or program... >How-To-Repeat: man 5 passwd >Fix: We should not suggest that a shell script be run for users that we are trying to STOP being able to use a system. A nasty user might attempt to suspend the shell script before it terminated (or executed some trap commands to handle being suspended) and so STILL LOG IN. >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199703131248.EAA25660>