azara has asked for the wisdom of the Perl Monks concerning the following question:
I have a script that runs fine on a Windows platform. The script is distributed to a number of users in binary form by means of PAR:pp.
Now the script has been ported to Linux, where it also runs well, but with one caveat: it requires root privileges in order to perform its tasks (which involve monitoring of network interfaces).
Now users shouldn't be required to work under uid 0, so the natural solution is to make the script (or better, its pp'ed binary counterpart) suid root.
This, in turn, enables taint checks - and the script does not pass them...
I understand that the "clean" solution would be to make the script safe. However
So what I'm looking for is a way to disable taint checks on a pp'ed binary that's suid root.
I figure that passing "-UX" to 'perl' would do the job, but I did not find a way to pass those options to a pp'ed binary. Is there any?
Would there by any other way to disable taint checks?
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re: suid, PAR:pp and disabling taint checks: pick any two of them
by jethro (Monsignor) on Oct 28, 2010 at 17:24 UTC | |
by azara (Initiate) on Oct 28, 2010 at 20:51 UTC | |
by Anonymous Monk on Oct 29, 2010 at 12:43 UTC | |
by azara (Initiate) on Oct 29, 2010 at 13:39 UTC |