Undeliverable mail to VMS host

mailer-daemon%cernvax.cern.ch at pucc.princeton.edu mailer-daemon%cernvax.cern.ch at pucc.princeton.edu
Tue Dec 18 03:31:19 AEST 1990


Your message to <@DxMINT.cern.ch:OLAVI%13411.decnet.CERN at CERNVAX.BITNET> could
 not be delivered.
The error message was:

Deferred: %MAIL-E-OPENOUT, error openning as output

This message is equivalent to the DECnet-VAX error message:

 -SYSTEM-F-EXDISKQUOTA, disk quota exceeded

The reason why your message could not be delivered is caused by the fact that
your correspondants account has ran out of diskquota. Please contact your
correspondant (by phone or otherwise) and tell him about this problem.


====== The start of Your original message ======

UNIX-WIZARDS Digest          Thu, 13 Dec 1990              V11#060

Today's Topics:
                            keyboard control
                               video ram
                              xenix tracks
               Re: Complex security mechanism is unsecure
             Re: non-superuser chown(2)s considered harmful
                           Password and gecos
                                  test
                           PROCESS MIGRATION
            Re: How to get past end of cpio archive on tape
             Re: non-superuser chown(2)s considered harmful
Re: Complex security mechanism is unsecure (was Re: non-superuser chown(2)s
 considered harmful)
                             Re: Serial I/O
                      SLIP for a 3B2 running 3.2.2
                       PROCESS MIGRATION IN UNIX
            Re: How do you find the symbolic links to files.
             Re: non-superuser chown(2)s considered harmful
            Re: How do you find the symbolic links to files.
           Re: Jargon file v2.1.5 28 NOV 1990 -- part 5 of 6
                          What do I do wrong?
                               Unix Feuds
                        Re: What do I do wrong?
            Re: How do you find the symbolic links to files.
            Re: The performance implications of the ISA bus
             Re: non-superuser chown(2)s considered harmful
               Re: Complex security mechanism is unsecure

-----------------------------------------------------------------

From: FDHEIENO%ucf1vm.cc.ucf.edu at ncsuvm.ncsu.edu
Subject: keyboard control
Date: 11 Dec 90 19:17:08 GMT
To:       unix-wizards at sem.brl.mil

In DOS, it's easy to detect whether a user has pressed ALT+F1, SHIFT+F1,
CTRL+F1, etc.  In Xenix, how do you detected whether a user has pressed
ALT + a, or ALT + F1, or any keystroke combination that involves the ALT key?
Please email responses to dfw at phys.physics.ucf.edu.  Thank

-----------------------------

From: FDHEIENO at ucf1vm.cc.ucf.edu
Subject: video ram
Date: 11 Dec 90 19:25:41 GMT
To:       unix-wizards at sem.brl.mil

In DOS, video ram can be accessed by B000 (mono) or B800 (color) to perform
fast screen refresh.  How can this be done in Xenix?  If not possible (or
horribly complicated), what's the next best method?  Please email responses to
dfw at phys.physics.ucf.edu.  Thanks for the help!

-----------------------------

From: FDHEIENO at ucf1vm.cc.ucf.edu
Subject: xenix tracks
Date: 11 Dec 90 19:32:08 GMT
To:       unix-wizards at sem.brl.mil

Is there a way to read the contents of a given track and put the data into
a file for inspection?  I`m thinking of cases where a track may go bad, and
the data needs to be recovered before marking the track bad with 'badtrk' in
Xenix.  Please email responses to dfw at phys.physics.ucf.edu.  Thanks for the
help!`

-----------------------------

From: John F Haugh II <jfh at rpp386.cactus.org>
Subject: Re: Complex security mechanism is unsecure
Date: 12 Dec 90 13:46:05 GMT
To:       unix-wizards at sem.brl.mil

In article <6874 at titcce.cc.titech.ac.jp>, mohta at necom830.cc.titech.ac.jp
 (Masataka Ohta) writes:
> In the latter case, you must be careful that no unauthorized person can
> have uucp nor root priviledge. If you have an executable owned by uucp
> in root's command serach path (like /usr/bin/tip), those who have uucp
> priviledge can easily set a trojan horse trap.

sure, and any program owned by "bin" which is in root's command search
path is also likely to be a trojan horse.  most of the programs in /bin
have that property.  this is why "bin" shouldn't have a password unless
you are willing to have the owners of "bin"'s password become "root"
someday.  and the same applies, of course, to "uucp" and "sys" and so on.

> >Unfortunately, if you have an application that
> >wants to change the ownership to the user, such as cu, you must now
> >make cu set-UID to "root".
>
> But it is more secure.

not true - read on.

> So, don't make the security mechanism complex. The simpler, the more secure.

this part is true - the number of things which you must protect against
with "root" being the effective user ID is far greater than the number
of failure modes with a program set-UID to "uucp".  "uucp" has no



More information about the Comp.unix.internals mailing list