> Oh yes, there's a 3rd choice - believe the UID that's
> stuffed into the kernel.  Since this can only be set by
> certain administrative programs (ie, login), this should
> normally be whatever value is in the password file, which
> is perfectly adequate security if what you're trying to secure
> is data that's stored on the local machine.  If you are
> instead trying to secure a network resource, you may want
> to think through your security model very carefully.

I don't believe this is the case... As near as I can tell, anyone can issue 
the GetToken and SetToken calls. 

In fact, for a while, I had a couple of little programs sitting around 
that would take your current tokens and convert to a easily transportable 
ASCII string, and another one that would take the string and set your 
current token from it. Neither required any special privileges. 

-- Nathan

------------------------------------------------------------
Nathan Neulinger                       EMail:  [EMAIL PROTECTED]
University of Missouri - Rolla         Phone: (573) 341-4841
Computing Services                       Fax: (573) 341-4216

Reply via email to