4.3 /etc/shells
der Mouse
mouse at mcgill-vision.UUCP
Wed Nov 12 07:00:39 AEST 1986
> Subject: 4.3 /bin/passwd does not deal with /etc/shells properly
> Repeat-By:
> Run passwd to request a new shell. Ask for a shell that is
> before your old shell in the list in /etc/shells.
> Subject: 4.3 vipw does not allow root to have a shell in /etc/shells
> Repeat-By:
> Edit the password file with vipw, and try to change root's
> shell to a shell listed in /etc/shells, but not /bin/sh or
> /bin/csh, (e.g., /bin/ksh). Watch vipw complain about mangling
> the password file.
Could someone explain what this /etc/shells silliness is all about?
Why joe user can't change his shell to whatever he pleases?? I see no
reason to restrict users in their choice of shells - in fact, this is
one of the things usually quoted as a great strength of UNIX. Or is
this an attempt to protect people from themselves? Why assume they
*need* protection from themselves? If I wanted to run another shell on
a system with this sort of stupidity I'd just specify /bin/sh and have
a one-line .profile
exec /.../myshell "$@"
or use /bin/csh and have a similar .cshrc -- so you really don't buy
anything. Just user aggravation and extra trash to maintain.
By the way, I would argue that the second "bug" I quoted above is not a
bug. One of the uses of root is to fix things when they break.
Suppose ksh is broken? Then you can't log in as root, you have to boot
single-user (involving bringing the system down).
der Mouse
USA: {ihnp4,decvax,akgua,utzoo,etc}!utcsri!mcgill-vision!mouse
think!mosart!mcgill-vision!mouse
Europe: mcvax!decvax!utcsri!mcgill-vision!mouse
ARPAnet: think!mosart!mcgill-vision!mouse at harvard.harvard.edu
[USA NSA food: terrorist, cryptography, DES, drugs, CIA, secret, decode]
More information about the Comp.bugs.4bsd.ucb-fixes
mailing list