Date: Sat, 1 Jun 1996 08:18:12 -0600 From: Sean Kelly <kelly@fsl.noaa.gov> To: dbabler@Rigel.orionsys.com Cc: questions@freebsd.org Subject: Re: Limiting access Message-ID: <199606011418.OAA26468@gatekeeper.fsl.noaa.gov> In-Reply-To: <Pine.BSF.3.91.960531170148.29128C-100000@Rigel.orionsys.com> (message from David Babler on Fri, 31 May 1996 17:09:24 -0700 (PDT))
next in thread | previous in thread | raw e-mail | index | archive | help
>>>>> "David" == David Babler <dbabler@Rigel.orionsys.com> writes:
David> I assume the real problem would be if a user just deleted
David> the stock .rhosts in their directory and replaced it with
David> one of their own, thus making that a trusted system. I
David> believe if I change permissions so they can't delete the
David> file, I'm okay, yes?
Yes, but that would mean changing owners on users' home directories.
To prevent users from removing the .rhosts file, you'd have to make
sure they didn't own their own home directories. And since they
didn't own them, they couldn't create any new files or subdirectories
unless you gave them appropriate permissions---and then they'd be able
to remove and create a new .rhosts file. (But some clever combination
of owner, mode, and sticky bit might work.)
Probably the right answer is to use the /etc/login.access file.
See login.access(5) and the sample, commented-out entries in
/etc/login.access.
--
Sean Kelly
NOAA Forecast Systems Laboratory kelly@fsl.noaa.gov
Boulder Colorado USA http://www-sdd.fsl.noaa.gov/~kelly/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199606011418.OAA26468>
