Access rights for suid programs. - (nf)

edhall%rand-unix at sri-unix.UUCP edhall%rand-unix at sri-unix.UUCP
Sat Dec 24 18:54:00 AEST 1983


Concerning your problem with emulating the USG suid mechanism on non-
suid programs: I once accomplished this sort of thing by having the
program spawn a child process which setuid()'d back to the real UID,
leaving the parent to clean up after the child died.  Of course, the
parent must be very careful with signals and the whole thing isn't
the most efficient technique in the world, but with vfork() things
aren't quite so bad.

Now, if UNIX had coroutines...          :-)

		-Ed
		edhall at rand-unix.ARPA
		decvax!randvax!edhall.UUCP



More information about the Comp.unix.wizards mailing list