| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: Did Microsoft just patent sudo? No. |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_0015_01C78F1F.417C93F0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
sudo is more like the runas feature present in Windows 2000. See =
"Use Run As to Start Administrative Tools While Logged On as a
User" =
http://www.microsoft.com/technet/prodtechnol/windows2000pro/tips/runas.ms=
px or =
http://www.microsoft.com/windows/windows2000/en/advanced/help/runas.htm. =
This is what sudo claims to do at http://www.sudo.ws/sudo/man/sudo.html =
which states "sudo allows a permitted user to execute a command as the
= superuser or another user".
UAC is something much more interesting. A notable difference is that =
for a user that is an administrator the elevated process doesn't run as =
another user. It runs as the same user with the same identity but =
elevated privileges. And this is only one aspect of UAC.
Rich
"mike" wrote in message =
news:kovo33t1taep1aqm08lh0s5it2pn87k48q{at}4ax.com...
More innovation from the boys in Redmond...
=
http://ubuntulinuxtipstricks.blogspot.com/2007/05/did-microsoft-just-pate=
nt-sudo.html
=3D=3D=3D
Did Microsoft just patent sudo?
Holy crap, I think they did. Here's the patent for UAC:=20
>>
A computer such as a network appliance executes an administrative
security process configured to run under an administrative privilege
level. Having an administrative privilege level, the administrative
security process can initiate administrative functions in an operating
system function library. A user process executing under a
non-administrative privilege level can initiate a particular
administrative function that the process would not otherwise be able =
to
initiate by requesting that the administrative security process =
initiate
the function. In response to a request to initiate a particular =
function
from a process with a non-administrative privilege level, the
administrative security process determines whether the requesting
process is authorized to initiate the particular administrative =
function
based on information accessed in a data store. If the requesting =
process
is authorized, the administrative security process initiates the
particular administrative function. In this manner, the administrative
security process facilitates access to specific administrative =
functions
for a user process having a privilege level that does not permit the
user process to access the administrative functions.
>>
Patent 6775781
=
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=3DPTO1&Sect2=3DHITOFF&d=3D=
PALL&p=3D1&u=3D%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=3D1&f=3DG&l=3D50&s1=3D67=
75781.PN.&OS=3DPN/6775781&RS=3DPN/6775781
Does that sound like sudo to you? Does to me. If you look at sudo's
manpage, you'll find a link to this site: The History of Sudo.=20
http://www.sudo.ws/sudo/history.html
What can this site tell us? Plenty. For instance,
>>=20
Sudo was first conceived and implemented by Bob Coggeshall and Cliff
Spencer around 1980 at the Department of Computer Science at
SUNY/Buffalo. It ran on a VAX-11/750 running 4.1BSD. An updated =
version,
credited to Phil Betchel, Cliff Spencer, Gretchen Phillips, John =
LoVerso
and Don Gworek, was posted to the net.sources newsgroup in December of
1985.
>>
1985, huh? And when did this Microsoft patent happen? It was filed in
2000. Well gee, that doesn't make sense. How'd they get the patent? It
certainly falls under the category of "obvious" if there's prior art
such as sudo.
What makes this whole thing funny, though, is something I saw a couple
days ago. Head over to Builder-AU and listen to Peter Watson from
Microsoft. He says,=20
>>
User Account Control is a great idea and strategically a direction =
that
sort of all operating systems and all technology should be heading =
down
>>
Excuse me? Does he really believe this is all Microsoft's great new
idea?
In the end, this seems like a patent that Microsoft will hold up and =
say
"we have a patent and Linux is violating it!" They won't ever sue on =
it
though (just leave the threat hanging to scare away potential users),
because then they could have the patent revoked. It's better for them =
to
just wave it around.
=3D=3D=3D
/m
------=_NextPart_000_0015_01C78F1F.417C93F0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
sudo is
more like the =
runas feature=20
present in Windows 2000. See "Use Run As to Start
Administrative = Tools=20
While Logged On as a User" http://www.microsoft.com/technet/prodtechnol/windows2000pro/tips/=
runas.mspx">http://www.microsoft.com/technet/prodtechnol/windows2000pro/t=
ips/runas.mspx or=20
http://www.microsoft.com/windows/windows2000/en/advanced/help/run=
as.htm">http://www.microsoft.com/windows/windows2000/en/advanced/help/run=
as.htm. =20
This is what sudo claims to do at http://www.sudo.ws/sudo/ma" target="new">http://www.sudo.ws/sudo/ma=">http://www.sudo.ws/sudo/man/sudo.html">http://www.sudo.ws/sudo/ma=
n/sudo.html which=20
states "sudo allows a=20 permitted user
to execute a command as the superuser or another =
user".
UAC is
something much more =
interesting. A notable difference is that for a user that is
an=20 administrator the elevated process doesn't run as another
user. It = runs as=20
the same user with the same identity but elevated privileges. And
= this is=20
only one aspect of UAC.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 @PATH: 379/45 1 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.