On Wed, Jul 21, 2021, 12:57 PM Greg Wooledge <g...@wooledge.org> wrote:

> On Wed, Jul 21, 2021 at 12:39:49PM -0400, Kenneth Parker wrote:
>
> > > Access: (0555/dr-xr-xr-x)  Uid: (    0/    root)   Gid: ( 1000/ frank)
>
> > Actually, access 555 means everyone can Read and Execute, but nobody can
> > Update.
> >
> > Root usually overrides that, which could explain why it still works.
>
> Yes.
>
> > Will chown work ?
> > >
> >
> > Actually, chmod might work better.  My system has 755, owned by Root.
> > Meaning only Root can Update, but everybody can Read and Execute.
>
> None of that explains why systemd says the thing is considered "unsafe".
> It's "unsafe" because it's owned by group "frank".
>

How did I miss that?

The only reason I can think of, for a different Group would be for
something like /var/log, so someone other than Root can read the Logs.

Thus, changing the GID back to 0 is the main issue (for suppressing the
> warning messages).  Fixing the perms from 555 to 755 is just for a bit
> of extra consistency.
>

That, and other layers of Security, such as selinux, where Root isn't
always "god".

Thanks for the clarification.

Kenneth Parker


>

Reply via email to