also sprach martin f krafft <[EMAIL PROTECTED]> [2004.10.26.1257 +0200]:
> Instead of applying ACLs recursively, I would like to be able to say
> that admin-a gets rwX rights to the directory group-a and all its
> subdirectories and files.

This can be done with default ACLs. However, the user can override
it, which should not be possible.

E.g.:

  setfacl -d -m admin-a:rwx /home/group-a
  getfacl /home/group-a/student-1
  # file: /home/group-a/student-1
  # owner: student-1
  # group: group-a
  user::rwx
  user:admin-a:rwx
  group::---
  other::---
  default:user::rwx
  default:user:admin-a:rwx
  default:group::---
  default:mask::---
  default:other::---

So far so good, admin-a has rwx rights on the directory and on all
files that student-1 creates.

However, student-1 can simply do

  chmod og= ~

and all the ACLs are void because the mask is zeroed.

  # file: /home/group-a/student-1
  # owner: students-1
  # group: group-a
  user::rwx
  user:admin-a:rwx    #effective:---
  group::---
  mask::---
  other::---
  default:user::rwx
  default:user:admin-a:rwx
  default:group::---
  default:mask::rwx
  default:other::---

Now, I could make the home directory be owned by root (or admin-a)
and give student-1 access with ACLs, but then any file that the
student creates would be owned by him/her and s/he could make it
non-readable by the supervisor.

Is there a way around this? Obviously, disabling access to chmod(1)
and the like is not an option, at least not because they could
compile their own anyway.

How could I solve this challenge?

-- 
Please do not CC me when replying to lists; I read them!
 
 .''`.     martin f. krafft <[EMAIL PROTECTED]>
: :'  :    proud Debian developer, admin, and user
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!

Attachment: signature.asc
Description: Digital signature

Reply via email to