On Wed, Mar 26, 2008 at 1:55 PM, seth vidal <skvidal@xxxxxxxxxxxxxxxxx> wrote: > > On Wed, 2008-03-26 at 08:42 -0400, Jesse Keating wrote: > > On Tue, 2008-03-25 at 12:02 -0600, Gian Paolo Mureddu wrote: > > > but being as /sbin paths are > > > meant for administrative tasks, I actually do see having them as part of > > > a regular user's PATH a potential security risk. > > > > That's completely bogus. A "hidden path" offers 0 security. If you > > don't want your users running them, set the permissions on the binary, > > or better yet, have the binary check the EUID of the caller. If > > non-root, display that the command is for root users, but also allow the > > user to get --help and other usage or informational output from the > > command. Just don't allow non-root users to apply anything. There > > really is no reason I can think of to hide this crap in a different > > directory. It just adds needless complication and confusion. > > > > +1 > -sv I'll post a RFE in BZ regarding this issue. What component should I choose? Valent. -- http://kernelreloaded.blog385.com/ linux, blog, anime, spirituality, windsurf, wireless registered as user #367004 with the Linux Counter, http://counter.li.org. ICQ: 2125241, Skype: valent.turkovic -- Fedora-desktop-list mailing list Fedora-desktop-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-desktop-list