UNIX in a Nutshell: System V Edition

UNIX in a Nutshell: System V EditionSearch this book
Previous: 4.7 Invoking the ShellChapter 4
The Bourne Shell and Korn Shell
Next: 4.9 Built-in Commands (Bourne and Korn Shells)
 

4.8 Restricted Shells

Restricted shells can be invoked in any of the following ways:

rksh		Korn shell
ksh -r
set -r

/usr/lib/rsh	Bourne shell
set -r

Restricted shells can also be set up by supplying the full pathname to rksh or rsh in the shell field of /etc/passwd or by using them as the value for the SHELL variable.

Restricted shells act the same as their nonrestricted counterparts, except that the following are prohibited:

Shell scripts can still be run, since in that case the restricted shell calls ksh or sh to run the script. This includes the /etc/profile, $HOME/.profile, and $ENV files.

Restricted shells are not used much in practice, as they are difficult to set up correctly.


Previous: 4.7 Invoking the ShellUNIX in a Nutshell: System V EditionNext: 4.9 Built-in Commands (Bourne and Korn Shells)
4.7 Invoking the ShellBook Index4.9 Built-in Commands (Bourne and Korn Shells)

The UNIX CD Bookshelf NavigationThe UNIX CD BookshelfUNIX Power ToolsUNIX in a NutshellLearning the vi Editorsed & awkLearning the Korn ShellLearning the UNIX Operating System