On Tuesday 23 Feb 2010, Sean Gibbins wrote: > Unlikely but plausible - additional security software has since been > installed or switched into deny mode that overrides standard Unix > permissions. eTrust/SeOS [1] used to be the bane of our lives in this > regard, but obviously we knew what we were dealing with and were > prepared for it when it reared its ugly head.
> [1] > http://sunsite.uakom.sk/sunworldonline/swol-07-1996/swol-07-security.html They might have done something like this, but I suspect not this product. >From your link SeOS provides amongst other things: 'SuperUser ID Protection. Root login is disallowed, and su's to root are allowed only for authorized users. All root operations are logged, with the user's real identity indicated. set-uid programs are protected by being "thumbprinted" -- if the thumbprint changes the program is no longer executable' I was able to log in as root, and I didn't do it by su. Of course, it's possible that the executable hasn't been thumbprinted, so that's worth checking. If that's the problem, then I'll need to establish what security tool they have installed so I can find out how to add this to the list of trusted executables. We are going to the customer's site on Thursday, so we can have a look at their machine and compare it's behaviour to our reference set. I'm trying to get as much insight into the possible cause before I go. -- Terry Coles 64 bit computing with Kubuntu Linux -- Next meeting: Dorchester, Tue 2010-03-02 20:00 http://dorset.lug.org.uk/ http://www.linkedin.com/groups?gid=2645413 Chat: http://www.mibbit.com/?server=irc.blitzed.org&channel=%23dorset List info: https://mailman.lug.org.uk/mailman/listinfo/dorset

