L1-A and security

De Clarke Sys Mgr root%helios.UCSC.EDU at ucscc.ucsc.edu
Fri Jul 14 09:53:23 AEST 1989


This may be just naivety on my part, but...

(1) I don't want my users using single-user mode to do silly or
    malicious things

(2) I don't want to be called in the middle of dinner to "please come
    and type in the root password because my workstation just crashed"

(3) I might settle for having sgl-user mode prompt for a username and
    password, checking it against its passwd file;  then the user could
    log in, but their name and the timestamp would be recorded (where,
    I wonder, that they couldn't gp and erase the record?).  Anyway, you
    get the idea.  The point is that strangers are more likely to be
    malicious than my own small, well-known user group;  and within
    my small group, people are much less likely to do anything stupid
    or "humorous" if it can be traced back to them.

This is obviously a blue-sky notion.  Can anyone point out either why it's
absolutely ridiculous or (if it isn't) how it could be implemented?

..............................
De Clarke, Systems Manager, UCO/Lick Observatory
Still trying to teach it epistemology...

root at helios.ucsc.edu, postmaster at portal.bitnet
voice: 408-429-2630   fax: 408-429-2730
The usual disclaimers apply;  your actual mileage may vary.



More information about the Comp.sys.sun mailing list