Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Jun 1997 09:54:30 +0200 (MET DST)
From:      Luigi Rizzo <luigi@labinfo.iet.unipi.it>
To:        lada@ws6303.gud.siemens.at (Hr.Ladavac)
Cc:        luigi@iet.unipi.it, xaa@stack.nl, hackers@FreeBSD.ORG
Subject:   Re: your rtprio stuff
Message-ID:  <199706100754.JAA06216@labinfo.iet.unipi.it>
In-Reply-To: <199706100804.KAA17947@ws6423.gud.siemens.at> from "Hr.Ladavac" at Jun 10, 97 10:04:31 am

next in thread | previous in thread | raw e-mail | index | archive | help
> > If you don't mind the risk of letting them run other commands in real time,
> > you could of course use commands like sudo or opcom that will give 
> > selected users root-privs without su for certain commands
> 
> Or, how about a suid root rtprio wrapper that does (among all)
> 
> ...
> 
> rtprio()
> execve( "your_real_executable" ... )
> 

this is exactly what the rtprio command does (except that it leaves
the user freedom to specify which program to execve).

If the wrapper is suid root, isn't the execve'd program also run with
root privileges ? The same, I think, might apply to "sudo" ?

	Luigi
-----------------------------+--------------------------------------
Luigi Rizzo                  |  Dip. di Ingegneria dell'Informazione
email: luigi@iet.unipi.it    |  Universita' di Pisa
tel: +39-50-568533           |  via Diotisalvi 2, 56126 PISA (Italy)
fax: +39-50-568522           |  http://www.iet.unipi.it/~luigi/
_____________________________|______________________________________



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199706100754.JAA06216>