Joe Sloan wrote:
Aaron Kulkis wrote:
Joe Sloan wrote:
I had to edit the paths even more extensively in hpux, solaris or aix - in fact anything in /opt or /usr/local usually wasn't even in root's path AND THEY'RE NOT SUPPOSED TO BE!!! That's a security risk.
Root is for ADMINISTRATIVE use, not running apps.
I'm not sure what you're getting at - are you saying it's a security risk for root to run "top" on solaris or hpux? A shame really, one of my favorite apps. How about linux? It's in root's path on every linux distro I've seen.
But that is getting completely away from the point, which was that suse provides for root a fully functional path, but removes e.g. /sbin and /usr/sbin from the path of non-root users, which needs fixing up.
- but I expect to spend time fixing things up to make those OSes Hat to say it, but no, you were possibly introducing security holes into those systems. Very few apps in /opt or /usr/local are ever tested for safety under root's UID.
Examples, please? What would be the security advantage of typing "/opt/SunWzztop/bin/top" every time, instead of "top", with /opt/SunWzztop/bin in the path?
akulkis@kulkix:~> which top /usr/bin/top akulkis@kulkix:~> Why isn't top in /usr/bin where it belongs? -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org