Judd Pickell wrote:
> Maybe it is just me, but wouldn't bypassing the password for sudo be
> defeating the purpose of sudo?
Nope, because sudo lets you limit what can be sudone by sudoers :)
For example, on some of my servers I let a monitoring system account
sudo "qmail-qstat"[1] without a password. That account has no passwd
(auths by shared SSH keys) and does not need other special privileges.
sudo takes a fair amount of intelligence and thoroughness to implement
securely- for example letting someone sudo an editor is always a bad
idea (since you can usually execute shell commands from an editor or at
the least overwrite something setuid like /bin/passwd with a shell
script that calls a shell). If possible, it should be avoided.
> I would probably recommend running gtkpod as root, so that you are
> prompted before it starts then you don't have to enter it on exit...
...at which point some bad code in gtkpod can erase / :-|
In this instance, though, why not just have the system modprobe that
module at startup?
As for eject, if you specify that the pod can be mounted by users
("user" option in fstab entry for /dev/sda2) then it can also be
unmounted and (I think) ejected by users.
~Ben
[1] I did modify that file to include absolute paths to the binaries it
uses to avoid path attacks though
--
---
"Confession only helps if you actually feel bad for your actions.
For you, it would just be a really long boast."
-Tara
http://www.emptiedout.com
---------------------------------------------------
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change you mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss