ric@arizona.edu (Ric Anderson) (06/07/89)
Anyone know the procedure needed to change the time zone from PDT to MST? I rumaged the man pages, but didn't find anything under the obvious key words. Thanks, Ric Ric Anderson Bitnet: Ric@Arizrvax Member of the Technical Staff Internet: ric@cs.arizona.edu Department of Computer Science AT&T: (602) 621-4048 University of Arizona Tucson, Arizona 85721
avie@wb1.cs.cmu.edu (Avadis Tevanian) (06/07/89)
In article <11408@megaron.arizona.edu> ric@arizona.edu (Ric Anderson) writes: >Anyone know the procedure needed to change the time zone from PDT to MST? Timezones are described from files in /etc/zoneinfo. In 0.9, create a link from /etc/zoneinfo/localtime to the correct file for your timezone. For MST, try /etc/zoneinfo/US/Mountain. Although you may want US/Arizona. In 1.0, Preferences will allow you to set the timezone in a MUCH more user-friendly way. -- Avadis Tevanian, Jr. (Avie) Manager, System Software Group / Chief Operating System Scientist NeXT, Inc. avie@cs.cmu.edu or avie@NeXT.com --
dorner@pequod.cso.uiuc.edu (Steve Dorner) (06/07/89)
In article <5139@pt.cs.cmu.edu> avie@wb1.cs.cmu.edu (Avadis Tevanian) writes: >In 1.0, Preferences will allow you to set the timezone in a MUCH more >user-friendly way. Does anybody besides me think that all the system-wide stuff that preferences lets you set ought to be accessible only to super-users? To wit: 1) system date and time 2) time zone (when incorporated) 3) boot device I for one am tired of changing the time on my system back to what it ought to be... -- Steve Dorner, U of Illinois Computing Services Office Internet: s-dorner@uiuc.edu UUCP: {convex,uunet}!uiucuxc!dorner IfUMust: (217) 244-1765
jgreely@oz.cis.ohio-state.edu (J Greely) (06/08/89)
In article <1178@garcon.cso.uiuc.edu> dorner@pequod.cso.uiuc.edu (Steve Dorner) writes: >In article <5139@pt.cs.cmu.edu> avie@wb1.cs.cmu.edu (Avadis Tevanian) writes: >>In 1.0, Preferences will allow you to set the timezone in a MUCH more >>user-friendly way. >Does anybody besides me think that all the system-wide stuff that >preferences lets you set ought to be accessible only to super-users? YES! This is a ridiculous misfeature, and it's downright dangerous in our environment. Gratuitously changing date and time can break cron scripts, accounting information, mail delivery, and backups (go ahead, try running daily backups on a machine that's spent the week in no less than three timezones), just for a start. Allowing any user to change the boot device is simply irresponsible (how long would it take *you* to take over any NeXT you can login to? Is your answer in minutes? Did you need to do anything outside of the window system?). >I for one am tired of changing the time on my system back to what it >ought to be... The worst part is that you have no way of finding out who caused the damage. If this behavior exists in 1.0 with no way for the administrator to disable it, no NeXTs will sit on our network. One will turn into a standalone demo machine, the other will be a printer, and no more will come into the department. Personally, I think the NeXT makes a nice high-end PC, but a lousy workstation. The fact that the company persists in giving away more privileges to *every* user reinforces that impression. If they want to make a personal computer, they should quit screwing up Unix to make it fit into their model. If they want to make a workstation, they need to supplement some of the design philosophy with reality checks. Enough idle torching. How *should* it work? I don't know. How would I *like* it to work? Simple. Believe it or not, you don't set date, time, and timezone very often, certainly not on a daily basis. These should be set in NetManager, in the local configuration window, because they're not "user preferences", they're system configuration. Sure, I might prefer to work on GMT (makes it easier to sleep in 'til noon), but the rest of the network that I'm part of is much more comfortable if I'm on EDT. Being five minutes off of the other machines is bad enough. As for setting boot device, I'd love to hear an argument as to why all users need to be able to set this. My response will most likely be hysterical laughter, but I *am* interested. Extra credit if your explanation holds up in a heterogenous network where the NeXT is to be trusted for NFS, mail, YP, and rlogin. -=- J Greely (jgreely@cis.ohio-state.edu; osu-cis!jgreely)
mrc@Tomobiki-Cho.CAC.Washington.EDU (Mark Crispin) (06/08/89)
I guess I don't understand, coming from an environment (DEC-20/Xerox Lisp) only 8 months ago where it was assumed you couldn't trust other machines and that even for things such as time you made sure that what you got matched the concensus of many machines. There is no security against anyone who has physical access to the console. Hell's bells, you can hit double-COMMAND-` to get an NMI interrupt, halt the machine, and then boot it any way you want. I'm no Unix wizard, but I know how to give myself superuser access to any NeXT I can lay my hands on, even without an account. I guess you could claim that this facility in Preferences opens up such access to someone who has an account on the NeXT but doesn't have access to the console (= logging in from another NeXT and then doing "Preferences -Host <myhost>"). I dunno. If you let guys log in on a NeXT but not use the console, maybe you'll protect /NextApps so they can't get at it. Is anyone using NeXTs as ordinary Unix timesharing boxes?? The bottom line remains that anyone can do anything on the console, at least until NeXT comes out with a model that lets you lock out the NMI interrupt or typein to the boot ROM (e.g. by key). So, why not assume that anybody you allow to use your NeXTs is going to be a responsible individual, albeit someone may need to be told what *not* to do. Anyone you can't trust not to do bad things in Preferences (once instructed on what not to do at your installation) can't be trusted with physical access to a NeXT console either. Mark Crispin / 6158 Lariat Loop NE / Bainbridge Island, WA 98110-2020 mrc@CAC.Washington.EDU / MRC@WSMR-SIMTEL20.Army.Mil / (206) 842-2385 Atheist & Proud / 450cc Rebel pilot -- a step up from 250cc's!!! tabesaserarenakerebanaranakattarashii...kisha no kisha ga kisha de kisha-shita sumomo mo momo, momo mo momo, momo ni mo iroiro aru uraniwa ni wa niwa, niwa ni wa niwa niwatori ga iru
avie@wb1.cs.cmu.edu (Avadis Tevanian) (06/08/89)
Please people, stay calm... Most people who buy a machine expect to be able to do whatever they want with their machine, including setting the time and date. If you need to administer someone's machine for them, then they will live by your rules (presumably). If this is the case, then just turn off the setuid bit for Preferences, for example. This may disable some other features that you wanted a user to retain (from Preferences), but most other things will still work (those that affect the defaults database, for example). -- Avadis Tevanian, Jr. (Avie) Manager, System Software Group / Chief Operating System Scientist NeXT, Inc. avie@cs.cmu.edu or avie@NeXT.com --
jgreely@previous.eng.ohio-state.edu (J Greely) (06/08/89)
In article <2333@blake.acs.washington.edu> mrc@Tomobiki-Cho.CAC.Washington.EDU (Mark Crispin) writes: > There is no security against anyone who has physical access to >the console. Hell's bells, you can hit double-COMMAND-` to get an NMI >interrupt, halt the machine, and then boot it any way you want. I'm >no Unix wizard, but I know how to give myself superuser access to any >NeXT I can lay my hands on, even without an account. Yup, and that's one major reason we won't buy them. We currently use Suns in both student labs and faculty offices, all sharing the same filesystems. What you might call a "hostile environment". The same problems exist on our suns, but with 4.x, if the console is not marked secure you can't boot single-user without the root password, and root logins are not permitted. NeXT has done part of that, but marking the console as not secure does nothing to prevent arbitrary users from booting single-user. Oops. There are other fun things that can be done with the ROM monitor, most of which are too complex for the average undergrad, but the combination of: a) user-creatable system disks, b) magical ownership of all files on an optical, and c) the ability to set the boot device in a "user-friendly fashion", allows people to break into the machine without ever leaving the user-friendly, bells-and-whistles window system. Bad enough having people breaking in, but at least with most systems they have to know *something* to do it! NeXT has created "security holes for the rest of us." >Is anyone using NeXTs as ordinary Unix >timesharing boxes?? I use the NeXT on my desk as a workstation, interacting with our network as a "trusted peer". It exports a filesystem, it mounts 56 file systems from other hosts, it uses the same password and group files, and looks like just another Unix box to other machines. The only reason I allow it to operate in this fashion is because the console sits in my office, over which I have some reasonable guarantees about security. In contrast, we have labs that contain large numbers of Suns for student use, and access to their consoles doesn't lower our security drastically. I'd like to make a machine like the NeXT available for use by ordinary people, but I don't trust it in a public location. > The bottom line remains that anyone can do anything on the >console, at least until NeXT comes out with a model that lets you lock >out the NMI interrupt or typein to the boot ROM (e.g. by key). Sun's solution to the ROM monitor problem was to make replacement chips that required a password to do anything other than continue. This would be acceptable for solving that problem (and, I think, preferable to adding a key). >So, >why not assume that anybody you allow to use your NeXTs is going to be >a responsible individual, albeit someone may need to be told what >*not* to do. Anyone you can't trust not to do bad things in >Preferences (once instructed on what not to do at your installation) >can't be trusted with physical access to a NeXT console either. Well, let's see. Of the 2000 or so people who have accounts on our Unix machines, the number I trust "not to do bad things" is about 50. This is equivalent to the support staff and system operators. With the fairly high turnover in population here (approximately 25% every 3 months), there will always be people who don't know what actions are "disrecommended", or can't be trusted to not do them. Easier to just not buy the NeXT, which, right now, is the solution we'd choose. -=- J Greely (jgreely@cis.ohio-state.edu; osu-cis!jgreely)
avie@wb1.cs.cmu.edu (Avadis Tevanian) (06/08/89)
In article <51400@tut.cis.ohio-state.edu> J Greely <jgreely@cis.ohio-state.edu> writes: > There are other fun things that can be done with the ROM monitor, 1.0 ROMS will have optional hardware protection. -- Avadis Tevanian, Jr. (Avie) Manager, System Software Group / Chief Operating System Scientist NeXT, Inc. avie@cs.cmu.edu or avie@NeXT.com --
dorner@pequod.cso.uiuc.edu (Steve Dorner) (06/08/89)
In article <2333@blake.acs.washington.edu> mrc@Tomobiki-Cho.CAC.Washington.EDU (Mark Crispin) writes: > The bottom line remains that anyone can do anything on the >console, at least until NeXT comes out with a model that lets you lock >out the NMI interrupt or typein to the boot ROM (e.g. by key). No disagreement there; I've complained about that before. > ... Anyone you can't trust not to do bad things in >Preferences (once instructed on what not to do at your installation) >can't be trusted with physical access to a NeXT console either. I agree that there is NO protection against malicious damage. But to put the time, etc, in such a prominent application, with such tempting buttons and controls just begs people (even responsible people who would NEVER do something deliberately wrong to my system) to play with them. In fact, the most knowledgeable among them do so with impunity, figuring that "This can't POSSIBLY set the real system time, that would be ridiculous." And that little calendar display? Everybody thinks its some sort of appoint- ment book, and tries clicking on the buttons. Educating regular users is one thing. But you simply can't educate everyone BEFORE they sit down at a cube. And, posting a list of "Fifteen Bad Things You Should Not Do" seems like a dangerous proposition; surely there is some _small_ validity to "security through obscurity". -- Steve Dorner, U of Illinois Computing Services Office Internet: s-dorner@uiuc.edu UUCP: {convex,uunet}!uiucuxc!dorner IfUMust: (217) 244-1765