Running random user programs as ROOT?!
Jan Mikkelsen
janm at dramba.neis.oz
Sat Jun 29 14:41:39 AEST 1991
In article <867 at minya.UUCP> jc at minya.UUCP (John Chambers) writes:
>BTW, this isn't purely hypothetical. I recently added a dumb terminal
>to this (Sys/VR3) system so that when X shoots itself in the foot and
>goes zombie on me, I have a back door to do something short of pushing
>the reset button. But what I can do there is very limited, because
>when I type "su" it just says "Sorry", without even asking me for a
>password. TFM hasn't helped at all to explain why su is so
>recalcitrant. I've done what any hacker would do - written my own
>version of su. Now I find that, according to the above, it is horribly
>broken. I'd like to know how to make it less so. How do I do that?
>
>If it's described somewhere in TFM (that I am too stupid to find), I'd
>like to know where, and how I missed it.
One place to look is probably getpass(3). It sounds to me like you
have managed to loose /dev/tty. Does anything else have problems asking
you for a password?
--
Jan Mikkelsen
janm at dramba.neis.oz.AU or janm%dramba.neis.oz at metro.ucc.su.oz.au
"She really is."
More information about the Comp.unix.admin
mailing list