<div>Exactaly.&nbsp; The system has been in service so long, we don't even know who the admin is, if there still is someone that knows the password.&nbsp; The machine is pretty critical, so I'm afraid to poke around too much.</div>
<div>&nbsp;</div>
<div>The chroot option was my favorite, but it appears you need to be su to use it..&nbsp;&nbsp; </div>
<div>&nbsp;</div>
<div>chroot /home/blah command</div>
<div>chroot: not super-user</div>
<div>&nbsp;</div>
<div>:(</div>
<div>&nbsp;</div>
<div>-Mike<br><br>&nbsp;</div>
<div><span class="gmail_quote">On 6/30/05, <b class="gmail_sendername">Poyner, Brandon</b> &lt;<a href="mailto:bpoyner@ccac.edu">bpoyner@ccac.edu</a>&gt; wrote:</span>
<blockquote class="gmail_quote" style="PADDING-LEFT: 1ex; MARGIN: 0px 0px 0px 0.8ex; BORDER-LEFT: #ccc 1px solid">That's making a lot of assumptions, like the sysadmin is not buried<br>under other obligations, that the user is allowed to take the machine to
<br>single user mode to take over root, or that the system isn't so critical<br>that it can be taken down at any time you feel like it.&nbsp;&nbsp;I would assume<br>that Mike has already thought through those scenarios and was looking
<br>for an alternate solution.&nbsp;&nbsp;I don't think the suggestions made were that<br>bad and don't require pestering the sysadmin or taking the machine down.<br><br>Brandon Poyner<br>Network Engineer III<br>CCAC - College Office
<br>412-237-3086<br><br><br><br>&gt; -----Original Message-----<br>&gt; From: wplug-bounces+bpoyner=<a href="mailto:ccac.edu@wplug.org">ccac.edu@wplug.org</a><br>&gt; [mailto:<a href="mailto:wplug-bounces+bpoyner=ccac.edu@wplug.org">
wplug-bounces+bpoyner=ccac.edu@wplug.org</a>] On Behalf<br>&gt; Of Devin Lee Drew<br>&gt; Sent: Wednesday, June 29, 2005 6:40 PM<br>&gt; To: General user list<br>&gt; Subject: RE: [wplug] hosts on sunOS 5.8<br>&gt;<br>&gt;
<br>&gt; --- Edward Walter &lt;<a href="mailto:ewalter@walterama.com">ewalter@walterama.com</a>&gt; wrote:<br>&gt;<br>&gt; &gt; You could try running your application in a chroot jail<br>&gt; &gt; and create a custom /etc/hosts within the jail.
<br>&gt; &gt;<br>&gt; &gt; -Ed<br>&gt;<br>&gt;<br>&gt; Come on gang, this medicine is worse than the illness.<br>&gt;<br>&gt; 1) Ask root to edit the file for you.<br>&gt;<br>&gt; or<br>&gt;<br>&gt; 2) Boot to single user mode and do it yourself.
<br>&gt;<br>&gt; <a href="http://www.unixway.com/vm/veritasvm/bootcdrom.html">http://www.unixway.com/vm/veritasvm/bootcdrom.html</a><br>&gt;<br>&gt;<br>&gt; Devin<br>&gt;<br>&gt; _______________________________________________
<br>&gt; wplug mailing list<br>&gt; <a href="mailto:wplug@wplug.org">wplug@wplug.org</a><br>&gt; <a href="http://www.wplug.org/mailman/listinfo/wplug">http://www.wplug.org/mailman/listinfo/wplug</a><br>&gt;<br><br>_______________________________________________
<br>wplug mailing list<br><a href="mailto:wplug@wplug.org">wplug@wplug.org</a><br><a href="http://www.wplug.org/mailman/listinfo/wplug">http://www.wplug.org/mailman/listinfo/wplug</a><br></blockquote></div><br>