Text 17749, 269 rader
Skriven 2007-05-05 14:11:20 av Rich (1:379/45)
Kommentar till text 17737 av mike (1:379/45)
Ärende: Re: Did Microsoft just patent sudo? No.
================================================
From: "Rich" <@>
This is a multi-part message in MIME format.
------=_NextPart_000_0015_01C78F1F.417C93F0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
sudo is more like the runas feature present in Windows 2000. See =
"Use Run As to Start Administrative Tools While Logged On as a User" =
http://www.microsoft.com/technet/prodtechnol/windows2000pro/tips/runas.ms=
px or =
http://www.microsoft.com/windows/windows2000/en/advanced/help/runas.htm. =
This is what sudo claims to do at http://www.sudo.ws/sudo/man/sudo.html =
which states "sudo allows a permitted user to execute a command as the =
superuser or another user".
UAC is something much more interesting. A notable difference is that =
for a user that is an administrator the elevated process doesn't run as =
another user. It runs as the same user with the same identity but = elevated
privileges. And this is only one aspect of UAC.
Rich
"mike" <mike@barkto.com> wrote in message =
news:kovo33t1taep1aqm08lh0s5it2pn87k48q@4ax.com...
More innovation from the boys in Redmond...
=
http://ubuntulinuxtipstricks.blogspot.com/2007/05/did-microsoft-just-pate=
nt-sudo.html
=3D=3D=3D
Did Microsoft just patent sudo?
Holy crap, I think they did. Here's the patent for UAC:=20
>>
A computer such as a network appliance executes an administrative
security process configured to run under an administrative privilege
level. Having an administrative privilege level, the administrative
security process can initiate administrative functions in an operating
system function library. A user process executing under a
non-administrative privilege level can initiate a particular
administrative function that the process would not otherwise be able =
to
initiate by requesting that the administrative security process =
initiate
the function. In response to a request to initiate a particular =
function
from a process with a non-administrative privilege level, the
administrative security process determines whether the requesting
process is authorized to initiate the particular administrative =
function
based on information accessed in a data store. If the requesting =
process
is authorized, the administrative security process initiates the
particular administrative function. In this manner, the administrative
security process facilitates access to specific administrative =
functions
for a user process having a privilege level that does not permit the
user process to access the administrative functions.
>>
Patent 6775781
=
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=3DPTO1&Sect2=3DHITOFF&d=3D=
PALL&p=3D1&u=3D%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=3D1&f=3DG&l=3D50&s1=3D67=
75781.PN.&OS=3DPN/6775781&RS=3DPN/6775781
Does that sound like sudo to you? Does to me. If you look at sudo's
manpage, you'll find a link to this site: The History of Sudo.=20
http://www.sudo.ws/sudo/history.html
What can this site tell us? Plenty. For instance,
>>=20
Sudo was first conceived and implemented by Bob Coggeshall and Cliff
Spencer around 1980 at the Department of Computer Science at
SUNY/Buffalo. It ran on a VAX-11/750 running 4.1BSD. An updated =
version,
credited to Phil Betchel, Cliff Spencer, Gretchen Phillips, John =
LoVerso
and Don Gworek, was posted to the net.sources newsgroup in December of
1985.
>>
1985, huh? And when did this Microsoft patent happen? It was filed in
2000. Well gee, that doesn't make sense. How'd they get the patent? It
certainly falls under the category of "obvious" if there's prior art
such as sudo.
What makes this whole thing funny, though, is something I saw a couple
days ago. Head over to Builder-AU and listen to Peter Watson from
Microsoft. He says,=20
>>
User Account Control is a great idea and strategically a direction =
that
sort of all operating systems and all technology should be heading =
down
>>
Excuse me? Does he really believe this is all Microsoft's great new
idea?
In the end, this seems like a patent that Microsoft will hold up and =
say
"we have a patent and Linux is violating it!" They won't ever sue on =
it
though (just leave the threat hanging to scare away potential users),
because then they could have the patent revoked. It's better for them =
to
just wave it around.
=3D=3D=3D
/m
------=_NextPart_000_0015_01C78F1F.417C93F0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.6000.16397" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT face=3DArial size=3D2> sudo is more like the =
runas feature=20
present in Windows 2000. See "Use Run As to Start Administrative =
Tools=20
While Logged On as a User" <A=20
href=3D"http://www.microsoft.com/technet/prodtechnol/windows2000pro/tips/=
runas.mspx">http://www.microsoft.com/technet/prodtechnol/windows2000pro/t=
ips/runas.mspx</A> or=20
<A=20
href=3D"http://www.microsoft.com/windows/windows2000/en/advanced/help/run=
as.htm">http://www.microsoft.com/windows/windows2000/en/advanced/help/run=
as.htm</A>. =20
This is what sudo claims to do at <A=20
href=3D"http://www.sudo.ws/sudo/man/sudo.html">http://www.sudo.ws/sudo/ma=
n/sudo.html</A> which=20
states "<FONT size=3D3><FONT face=3D"Times New = Roman"><STRONG>sudo</STRONG>
allows a=20 permitted user to execute a <EM>command</EM> as the superuser or
another =
user</FONT></FONT>".</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2> UAC is something much more =
interesting. A notable difference is that for a user that is an=20
administrator the elevated process doesn't run as another user. It = runs
as=20
the same user with the same identity but elevated privileges. And = this
is=20
only one aspect of UAC.</FONT></DIV>
<DIV><FONT face=3DArial size=3D2></FONT> </DIV>
<DIV><FONT face=3DArial size=3D2>Rich</FONT></DIV>
<DIV> </DIV>
<BLOCKQUOTE=20
style=3D"PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; =
BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV>"mike" <<A =
href=3D"mailto:mike@barkto.com">mike@barkto.com</A>> wrote=20
in message <A=20
=
href=3D"news:kovo33t1taep1aqm08lh0s5it2pn87k48q@4ax.com">news:kovo33t1tae=
p1aqm08lh0s5it2pn87k48q@4ax.com</A>...</DIV><BR>More=20
innovation from the boys in Redmond...<BR><BR><A=20
=
href=3D"http://ubuntulinuxtipstricks.blogspot.com/2007/05/did-microsoft-j=
ust-patent-sudo.html">http://ubuntulinuxtipstricks.blogspot.com/2007/05/d=
id-microsoft-just-patent-sudo.html</A><BR><BR>=3D=3D=3D<BR>Did=20
Microsoft just patent sudo?<BR><BR>Holy crap, I think they did. Here's =
the=20
patent for UAC: <BR><BR>>><BR>A computer such as a network =
appliance=20
executes an administrative<BR>security process configured to run under =
an=20
administrative privilege<BR>level. Having an administrative privilege =
level,=20
the administrative<BR>security process can initiate administrative =
functions=20
in an operating<BR>system function library. A user process executing =
under=20
a<BR>non-administrative privilege level can initiate a=20
particular<BR>administrative function that the process would not =
otherwise be=20
able to<BR>initiate by requesting that the administrative security =
process=20
initiate<BR>the function. In response to a request to initiate a =
particular=20
function<BR>from a process with a non-administrative privilege level,=20
the<BR>administrative security process determines whether the=20
requesting<BR>process is authorized to initiate the particular =
administrative=20
function<BR>based on information accessed in a data store. If the =
requesting=20
process<BR>is authorized, the administrative security process =
initiates=20
the<BR>particular administrative function. In this manner, the=20
administrative<BR>security process facilitates access to specific=20
administrative functions<BR>for a user process having a privilege =
level that=20
does not permit the<BR>user process to access the administrative=20
functions.<BR>>><BR><BR><BR>Patent 6775781<BR><A=20
=
href=3D"http://patft.uspto.gov/netacgi/nph-Parser?Sect1=3DPTO1&Sect2=3D=
HITOFF&d=3DPALL&p=3D1&u=3D%2Fnetahtml%2FPTO%2Fsrchnum.htm&=
;r=3D1&f=3DG&l=3D50&s1=3D6775781.PN.&OS=3DPN/6775781&=
RS=3DPN/6775781">http://patft.uspto.gov/netacgi/nph-Parser?Sect1=3DPTO1&a=
mp;Sect2=3DHITOFF&d=3DPALL&p=3D1&u=3D%2Fnetahtml%2FPTO%2Fsrch=
num.htm&r=3D1&f=3DG&l=3D50&s1=3D6775781.PN.&OS=3DPN/6=
775781&RS=3DPN/6775781</A><BR><BR><BR>Does=20
that sound like sudo to you? Does to me. If you look at =
sudo's<BR>manpage,=20
you'll find a link to this site: The History of Sudo. <BR><A=20
=
href=3D"http://www.sudo.ws/sudo/history.html">http://www.sudo.ws/sudo/his=
tory.html</A><BR>What=20
can this site tell us? Plenty. For instance,<BR><BR>>> <BR>Sudo =
was=20
first conceived and implemented by Bob Coggeshall and Cliff<BR>Spencer =
around=20
1980 at the Department of Computer Science at<BR>SUNY/Buffalo. It ran =
on a=20
VAX-11/750 running 4.1BSD. An updated version,<BR>credited to Phil =
Betchel,=20
Cliff Spencer, Gretchen Phillips, John LoVerso<BR>and Don Gworek, was =
posted=20
to the net.sources newsgroup in December =
of<BR>1985.<BR>>><BR><BR>1985,=20
huh? And when did this Microsoft patent happen? It was filed =
in<BR>2000. Well=20
gee, that doesn't make sense. How'd they get the patent? =
It<BR>certainly falls=20
under the category of "obvious" if there's prior art<BR>such as=20
sudo.<BR><BR>What makes this whole thing funny, though, is something I =
saw a=20
couple<BR>days ago. Head over to Builder-AU and listen to Peter Watson =
from<BR>Microsoft. He says, <BR><BR>>><BR>User Account Control =
is a=20
great idea and strategically a direction that<BR>sort of all operating =
systems=20
and all technology should be heading down<BR>>><BR><BR>Excuse =
me? Does=20
he really believe this is all Microsoft's great new<BR>idea?<BR><BR>In =
the=20
end, this seems like a patent that Microsoft will hold up and =
say<BR>"we have=20
a patent and Linux is violating it!" They won't ever sue on =
it<BR>though (just=20
leave the threat hanging to scare away potential users),<BR>because =
then they=20
could have the patent revoked. It's better for them to<BR>just wave it =
around.<BR>=3D=3D=3D<BR><BR> /m</BLOCKQUOTE></BODY></HTML>
------=_NextPart_000_0015_01C78F1F.417C93F0--
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
|