Submitted 28-Sep-00 by Marco Fioretti:

> 1) How could this happen? Security is wonderful,
> but obtaining it by making commands unuseable
> makes the system itself unuseable to everyone.
> As far as I can remember, I selected level 4 during
> custom installation and did not touch anything else
> afterwards.

High and Paranoid (level 4 and 5) security is not meant to be used on
systems that will be used by regular users without specific knowledge. These
security levels lock things down to deter their use, but don't make it
impossible.

> 2) If /usr/bin is unreachable, how can bash use it
> and tcsh not? Is bash setuid root or something? (I
> forgot to check this at home..). If so, it's bad,
> isn't it?

Bash is /bin/bash not /usr/bin/bash.  Furthermore if you dislike the
exclusion of the /usr/bin directory from the default path, you can always
add it to the relevent configuration files.  Also, try using an explicit
path to reach /usr/bin/tcsh (and why is it in /usr/bin?  It installs by
default as /bin/tcsh)

(%:~)- which tcsh
/bin/tcsh
(%:~)- rpm -qf $(which tcsh)
tcsh-6.08.00-9mdk

-- 
Anton Graham                            GPG ID: 0x18F78541
<[EMAIL PROTECTED]>                 RSA key available upon request
 
What no spouse of a writer can ever understand is that a writer is working
when he's staring out the window.


Keep in touch with http://mandrakeforum.com: 
Subscribe the "[EMAIL PROTECTED]" mailing list.

Reply via email to