On Tuesday 23 Feb 2010, Sean Gibbins wrote:
> Unlikely but plausible - additional security software has since been
> installed or switched into deny mode that overrides standard Unix
> permissions. eTrust/SeOS [1] used to be the bane of our lives in this
> regard, but obviously we knew what we were dealing with and were
> prepared for it when it reared its ugly head.

> [1]
> http://sunsite.uakom.sk/sunworldonline/swol-07-1996/swol-07-security.html

They might have done something like this, but I suspect not this product.  
>From your link SeOS provides amongst other things:

'SuperUser ID Protection.
Root login is disallowed, and su's to root are allowed only for authorized 
users. All root operations are logged, with the user's real identity 
indicated. set-uid programs are protected by being "thumbprinted" -- if the 
thumbprint changes the program is no longer executable'

I was able to log in as root, and I didn't do it by su.  Of course, it's 
possible that the executable hasn't been thumbprinted, so that's worth 
checking.  If that's the problem, then I'll need to establish what security 
tool they have installed so I can find out how to add this to the list of 
trusted executables.

We are going to the customer's site on Thursday, so we can have a look at 
their machine and compare it's behaviour to our reference set.  I'm trying to 
get as much insight into the possible cause before I go.

-- 
                Terry Coles
                64 bit computing with Kubuntu Linux


-- 
Next meeting: Dorchester, Tue 2010-03-02 20:00
http://dorset.lug.org.uk/     http://www.linkedin.com/groups?gid=2645413
   Chat: http://www.mibbit.com/?server=irc.blitzed.org&channel=%23dorset
           List info: https://mailman.lug.org.uk/mailman/listinfo/dorset

Reply via email to