Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.2 9/18/84; site brl-tgr.ARPA
Path: utzoo!watmath!clyde!bonnie!akgua!sdcsvax!dcdwest!ittvax!decvax!wanginst!ucadmus!harvard!seismo!brl-tgr!tgr!roger@ll-sst.ARPA
From: Roger Hale 
Newsgroups: net.unix-wizards
Subject: UNIX src vs binary
Message-ID: <8141@brl-tgr.ARPA>
Date: Fri, 8-Feb-85 14:26:33 EST
Article-I.D.: brl-tgr.8141
Posted: Fri Feb  8 14:26:33 1985
Date-Received: Mon, 11-Feb-85 04:02:55 EST
Sender: news@brl-tgr.ARPA
Organization: Ballistic Research Lab
Lines: 16

From: cottrell@NBS-VMS.ARPA
(Replying-to: BostonU SysMgr )
> Time of day could be enforced by coding a `shell' program that
> chec[ks] the time, & only exec's /bin/sh if legal. It could also
> require secondary passwords. The path name of the user's desired
> shell could be encoded after his name in the gecos field.

I wouldn't use the gecos field; it's already overused.  Berkeley
keeps a finger database in the position you mention.  (Version 7
suggests GCOS job number, box number, optional GCOS user-id *<8-) .)
I would look for a .shell file in the user's home directory and
accept the name therein if it's on my list of ``trusted shells''
(which I might compile in or read from a ``secure'' file in /etc).

Yr obedt svt,
Roger Hale (roger@ll-sst)