>  "Jack Goldstein" <[EMAIL PROTECTED]> writes: 
>   > Ref:  Your note of Mon, 30 Nov 92 8:24:22 EST
>   > 
>   > For the first problem, (installs in non-standard directories), I just use
>   > make to build the programs and then install them using my own shell
>   > script.  For the second (allowing users to do vos releases), I set up
>   > a services account on our AFS server that allows users to rsh to it
>   > without a password.  The account shell is a special program that
>   > will perform one of a small set of privileged services.  In the case of
> How does this program gain the privileges to perform these actions?
> Something like the reauth daemon?  Or something less or more involved?

I wrote two utilities aksrvtgt and aksrvutil some time ago which we use
to hack enough holes into AFS/Kerberos security to be able to breathe
again. They're meant to mimic their Kerberos counterparts. Basically
equivalent to having 'klog -password' in clear text in a shell script,
just that the password is encoded and therefore slightly harder to type.

I'm not particularly proud of them, that's why I started looking into ADM
recently which looks promising.

-- 
Rainer Toebbicke   -   [EMAIL PROTECTED]    -    [EMAIL PROTECTED]
European Laboratory for Particle Physics - CERN
Geneva, Switzerland

Reply via email to