Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.2 9/18/84; site brl-tgr.ARPA Path: utzoo!watmath!clyde!bonnie!akgua!sdcsvax!dcdwest!ittvax!decvax!wanginst!ucadmus!harvard!seismo!brl-tgr!tgr!roger@ll-sst.ARPA From: Roger HaleNewsgroups: net.unix-wizards Subject: UNIX src vs binary Message-ID: <8141@brl-tgr.ARPA> Date: Fri, 8-Feb-85 14:26:33 EST Article-I.D.: brl-tgr.8141 Posted: Fri Feb 8 14:26:33 1985 Date-Received: Mon, 11-Feb-85 04:02:55 EST Sender: news@brl-tgr.ARPA Organization: Ballistic Research Lab Lines: 16 From: cottrell@NBS-VMS.ARPA (Replying-to: BostonU SysMgr ) > Time of day could be enforced by coding a `shell' program that > chec[ks] the time, & only exec's /bin/sh if legal. It could also > require secondary passwords. The path name of the user's desired > shell could be encoded after his name in the gecos field. I wouldn't use the gecos field; it's already overused. Berkeley keeps a finger database in the position you mention. (Version 7 suggests GCOS job number, box number, optional GCOS user-id *<8-) .) I would look for a .shell file in the user's home directory and accept the name therein if it's on my list of ``trusted shells'' (which I might compile in or read from a ``secure'' file in /etc). Yr obedt svt, Roger Hale (roger@ll-sst)