April Chin writes:
> Regarding the issue of pfksh93 invoking built-ins instead of binaries
> (e.g., the chown built-in in ksh93 instead of pfexec'ing the
> /usr/bin/chown binary), I propose that we include pfksh93
> but disable only the built-ins bound to the /bin pathname:

That seems quite reasonable to me.  (The big concern is with chown,
but getting the others seems harmless.)

>   The built-ins bound to /usr/ast/bin could be either disabled for
>   pfksh93 or we could argue that they are undocumented and there should
>   be no expectation by users that they will allow RBAC-enhanced
>   privileges.

As I understand it, the user would add the "virtual" directory
/usr/ast/bin to his path, right?

Whatever bit of text documents this path (the original case proposed
"Volatile" stability for the /usr/ast/bin mechanism, which means it's
a public interface) should note that it may cause trouble with
pfksh93.  Other than that, this seems fine.

-- 
James Carlson, KISS Network                    <james.d.carlson at sun.com>
Sun Microsystems / 1 Network Drive         71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677

Reply via email to