I wonder what Reeds meant. I know there are issues. For example, the 3B2 I administered for a while in the late 80s had multiple accounts with rsh, the restricted shell, as the login shell. That was okay, unless you used su and then had access to a root shell. HP/UX was way worse, with over 120 SUID shell scripts in the 90s. A much more interesting example of insecurity. But somehow, I'm guessing that's not what Reeds wrote about. Rik On Wed, Jan 1, 2025 at 8:02 AM Douglas McIlroy < douglas.mcilroy@dartmouth.edu> wrote: > I have it and will try to scan it in the next few days. Bug me if it > doesn't appear. > > Doug > > On Tue, Dec 31, 2024 at 11:37 AM Chet Ramey wrote: > > > > On 12/29/24 8:44 AM, Douglas McIlroy wrote: > > > I can supply a copy if no one else has beaten me to it. > > > > > > Ron Hardin subsequently pushed the limit even further. Unfortunately, > > > I do not have a record of that work. > > > > Along these same lines, does anyone on the list have a copy of > > > > "J. A. Reeds, /bin/sh: The biggest UNIX security Loophole, > > 11217-840302-04TM, AT&T Bell Laboratories, Murray Hill, NJ (1984)"? > > > > Years ago, in another lifetime, I wrote and asked him for a copy, but > > never got a reply. > > > > -- > > ``The lyf so short, the craft so long to lerne.'' - Chaucer > > ``Ars longa, vita brevis'' - Hippocrates > > Chet Ramey, UTech, CWRU chet@case.edu > http://tiswww.cwru.edu/~chet/ >