From owner-freebsd-questions Mon Aug 10 17:08:11 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA25523 for freebsd-questions-outgoing; Mon, 10 Aug 1998 17:08:11 -0700 (PDT) (envelope-from owner-freebsd-questions@FreeBSD.ORG) Received: from tltodd.com (badger.tltodd.com [208.133.92.209]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA25515 for ; Mon, 10 Aug 1998 17:08:07 -0700 (PDT) (envelope-from tlt@tltodd.com) Received: (from tlt@localhost) by tltodd.com (8.8.3/8.8.3) id TAA20898 for freebsd-questions@freebsd.org; Mon, 10 Aug 1998 19:17:23 -0500 (CDT) Date: Mon, 10 Aug 1998 19:17:23 -0500 (CDT) From: Terry Todd Message-Id: <199808110017.TAA20898@tltodd.com> To: freebsd-questions@FreeBSD.ORG Subject: setuid shell script Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Is there something that prevents a setuid root shell script from working? I have a file that is setuid to root with the following lines in it. #!/bin/sh id The id it comes back with is the uid of the user executing the shell script. And yes I am aware that setuid root shell scripts are a security problem bu none-the-less I'd like to find the answer to this problem. Thanks, Terry Todd To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message