Please do not reply to this email- if you want to comment on the bug, go to the URL shown below and enter your comments there.
Changed by [EMAIL PROTECTED] http://bugzilla.ximian.com/show_bug.cgi?id=77340 --- shadow/77340 2006-08-30 06:13:20.000000000 -0400 +++ shadow/77340.tmp.8361 2006-11-16 10:42:42.000000000 -0500 @@ -104,6 +104,18 @@ shell script because it could not be easily done in C#. As someone with not much shell scripting experience I don't know what you mean with "The shell script is a total hack. It's unsupportable and should not ship in its current state." Do you have any suggestions for improvement of this script? + +------- Additional Comments From [EMAIL PROTECTED] 2006-11-16 10:42 ------- +Regarding O_NOFOLLOW: + +I don't think it's enough for a solution. If you drop the "-s" from +"ln -s /etc/shadow /tmp/foo.exe.lock" (that is, create a hardlink), +non-root is still permitted to create such a link, and I can't imagine +that O_NOFOLLOW can prevent opening such a file. + +Go ahead and try your solution out using "Steps to reproduce the +problem" (with and without -s). They're 100% reproducible, so you will +know instantly what works and what does not. _______________________________________________ mono-bugs maillist - [email protected] http://lists.ximian.com/mailman/listinfo/mono-bugs
