Submitted 28-Sep-00 by Marco Fioretti: > 1) How could this happen? Security is wonderful, > but obtaining it by making commands unuseable > makes the system itself unuseable to everyone. > As far as I can remember, I selected level 4 during > custom installation and did not touch anything else > afterwards. High and Paranoid (level 4 and 5) security is not meant to be used on systems that will be used by regular users without specific knowledge. These security levels lock things down to deter their use, but don't make it impossible. > 2) If /usr/bin is unreachable, how can bash use it > and tcsh not? Is bash setuid root or something? (I > forgot to check this at home..). If so, it's bad, > isn't it? Bash is /bin/bash not /usr/bin/bash. Furthermore if you dislike the exclusion of the /usr/bin directory from the default path, you can always add it to the relevent configuration files. Also, try using an explicit path to reach /usr/bin/tcsh (and why is it in /usr/bin? It installs by default as /bin/tcsh) (%:~)- which tcsh /bin/tcsh (%:~)- rpm -qf $(which tcsh) tcsh-6.08.00-9mdk -- Anton Graham GPG ID: 0x18F78541 <[EMAIL PROTECTED]> RSA key available upon request What no spouse of a writer can ever understand is that a writer is working when he's staring out the window.
Keep in touch with http://mandrakeforum.com: Subscribe the "[EMAIL PROTECTED]" mailing list.
