From owner-freebsd-hackers Fri May 26 16:47:54 1995 Return-Path: hackers-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id QAA05955 for hackers-outgoing; Fri, 26 May 1995 16:47:54 -0700 Received: from westhill.cdrom.com (westhill.cdrom.com [192.216.223.57]) by freefall.cdrom.com (8.6.10/8.6.6) with ESMTP id QAA05949 for ; Fri, 26 May 1995 16:47:51 -0700 Received: from localhost.cdrom.com (localhost.cdrom.com [127.0.0.1]) by westhill.cdrom.com (8.6.11/8.6.11) with SMTP id QAA18239 ; Fri, 26 May 1995 16:47:37 -0700 X-Authentication-Warning: westhill.cdrom.com: Host localhost.cdrom.com didn't use HELO protocol To: "matthew c. mead" cc: hackers@FreeBSD.org Subject: Re: Setuid perl scripts In-reply-to: Your message of "Fri, 26 May 1995 17:53:12 EDT." <199505262153.RAA17029@Glock.COM> Date: Fri, 26 May 1995 16:47:36 -0700 Message-ID: <18237.801532056@westhill.cdrom.com> From: Gary Palmer Sender: hackers-owner@FreeBSD.org Precedence: bulk In message <199505262153.RAA17029@Glock.COM>, "matthew c. mead" writes: > Anyone know why setuid perl scripts don't work with /usr/bin/perl? >Thanks! Because when perl detects it's being run set[ug]id, it moves to working with `taintperl' which does a bit more security checking (or something) to prevent security holes opening up inadvertantly. perl scripts quite often have to be re-written to work properly under taintperl 'cos of it's restrictions. See the man page for more. Gary