Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Mar 1997 04:48:57 -0800 (PST)
From:      phillip@pm.cse.rmit.edu.au
To:        freebsd-gnats-submit@freebsd.org
Subject:   docs/2978: "man 5 passwd" suggests use of a shell script for (INSECURE) messaging
Message-ID:  <199703131248.EAA25660@freefall.freebsd.org>
Resent-Message-ID: <199703131250.EAA25709@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         2978
>Category:       docs
>Synopsis:       "man 5 passwd" suggests use of a shell script for (INSECURE) messaging
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-bugs
>State:          open
>Class:          doc-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Mar 13 04:50:01 PST 1997
>Last-Modified:
>Originator:     Phillip Musumeci
>Organization:
RMIT Computer Systems Eng. Dept.
>Release:        3.0 SNAP (January 1997), 2.1.5R, 2.1.6R
>Environment:
3.0-970114-SNAP
>Description:
     shells remapped and therefore be denied access.  All other NIS password
     records will be ignored. The administrator may add a wildcard entry to
     the end of the list such as:
           +:::::::::/usr/local/bin/go_away
     <snip>
     /usr/local/bin/go_away can be a short shell or program...
>How-To-Repeat:
     man 5 passwd
>Fix:
We should not suggest that a shell script be run for users that
we are trying to STOP being able to use a system.  A nasty user
might attempt to suspend the shell script before it terminated
(or executed some trap commands to handle being suspended) and
so STILL LOG IN.
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199703131248.EAA25660>