The keyboard of [EMAIL PROTECTED] emitted at some point in time:
> 
> 
> 
> One of the reasons to use setuid was to prevent users from manipulating
> data in any way other than a certain application.

And it is probably the worst. Slapping setuid onto executeables so that
they can manipulate global files is easily the biggest single source of
security breaks.

> I want a particular executable to be the only route a user has
> to access a set of files.

Set up a server to do this, and make it listen on a port. (I guess you
are using some kind of network, as otherwise you would not have a
problem with afs.) Devise a set of request messages, provide a library
of routines constructing them, and link people's applications against
that. This gives you immediately the following benefits:

  o  Your application will scale immediately to reasonably big databases.

  o  You do not need to provide new code for every new fashion in user-
     interface design.

  o  You can upgrade your database processing independently of any
     upgrade in the programs the requestors use, or their underlying
     operating systems.

The fact that some 13 years ago Sun cloaked a message passing system in
terms of procedure calls (rpc) does not mean that you are never allowed
to think in terms of message passing rather than procedure calls.

                                Thomas

*   email: cmaae47 @ imperial.ac.uk  (uk.ac.imperial on Janet)
*   voice: +44 171 594 6904 (day)
*   fax:   +44 171 594 6958
*   snail: Thomas Sippel - Dau
*          Application Support Group
*          The Center for Computing Services
*          Imperial College of Science, Technology and Medicine
*          Exhibition Road
*          Kensington SW7 2BX
*          Great Britain


Reply via email to