Re: permissions in /sbin

2007-12-07 Thread David Brodbeck
On Dec 6, 2007, at 10:24 PM, Nate Duehr wrote: On Dec 5, 2007, at 10:31 AM, David Brodbeck wrote: One obvious problem with removing permissions on all this stuff is there are sometimes situations where an ordinary user legitimately needs to run, say, mount. Seems to me like setting up

Re: permissions in /sbin

2007-12-07 Thread Osamu Aoki
On Wed, Dec 05, 2007 at 07:51:55AM -0600, John Hasler wrote: > andy writes: > > OK - but according to RUTE sbin = "Superuser binary executables. > > The "s" is for "system", not for "superuser". > > > These are programs for system administration only. Only the root will > > have these executables

Re: permissions in /sbin

2007-12-06 Thread Nate Duehr
On Dec 5, 2007, at 10:31 AM, David Brodbeck wrote: One obvious problem with removing permissions on all this stuff is there are sometimes situations where an ordinary user legitimately needs to run, say, mount. Seems to me like setting up that user with sudo access to mount would fix th

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-06 Thread David Brodbeck
On Dec 5, 2007, at 6:20 PM, Douglas A. Tutty wrote: I don't know if OpenBSD has any other tricks under the hood to protect the system from a milicious but legitimate shell user. They might have a few, I don't know. It's worth noting that their brag line on their website only refers to *rem

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Douglas A. Tutty
On Wed, Dec 05, 2007 at 04:58:59PM +0100, Martin Marcher wrote: > On 12/4/07, andy <[EMAIL PROTECTED]> wrote: > > ls -l /sbin is all > > > > -rwxr-xr-x 1 root root ... > > I understand this issue. What I don't get is why it seems to be the > overall default that others may read and execute files

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread David Brodbeck
On Dec 5, 2007, at 9:57 AM, Martin Marcher wrote: But since *nix has a history of being secure because a user/process can't by default destroy any data besides the data one/it owns. Why not take that one further and require explicit permission to even run a program that can potentially destroy d

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Joey Hess
Martin Marcher wrote: > /usr/bin/perl > /usr/bin/wget > /bin/tar How about /bin/cat, which can be used to transfer copies of any of these onto the system? > * Why not take that one further and require explicit permission to run > _any_ program? Because then you have a web server with some CGIs.

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Martin Marcher
On 12/5/07, Joey Hess <[EMAIL PROTECTED]> wrote: > Martin Marcher wrote: > > So the user needs to get a precompiled gcc somewhere. > > Then she would need to get all the header files necessary > > Then she needs to get the source. > > Then the quota is full... :) > > Most systems come with perl. Pe

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Joey Hess
Martin Marcher wrote: > So the user needs to get a precompiled gcc somewhere. > Then she would need to get all the header files necessary > Then she needs to get the source. > Then the quota is full... :) Most systems come with perl. Perl can do anything any non-suid program in /sbin can do. Most

Re: permissions in /sbin

2007-12-05 Thread David Brodbeck
On Dec 5, 2007, at 5:51 AM, John Hasler wrote: andy writes: OK - but according to RUTE sbin = "Superuser binary executables. The "s" is for "system", not for "superuser". These are programs for system administration only. Only the root will have these executables in their path" ("Rute User

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Martin Marcher
On 12/5/07, Mike Bird <[EMAIL PROTECTED]> wrote: > > I guess it's more a historical reason that others can r+x most of the > > system but I can see a lot of benefits in denying others by default > > (of course there's a lot of work involved to migrate from the current > > permission schema that's a

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Martin Marcher
Hi, On 12/5/07, Nyizsnyik Ferenc <[EMAIL PROTECTED]> wrote: > On Wed, 5 Dec 2007 16:58:59 +0100 > "Martin Marcher" <[EMAIL PROTECTED]> wrote: > > /bin root:users rwxr-x--- > > /sbin root:adm rwxr-x--- > > /usr/bin root:users rwxr-x--- > > /usr/sbin root:adm rwxr-x--- > > I do get your idea, but ha

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Mike Bird
On Wednesday 05 December 2007 07:58:59 Martin Marcher wrote: > On 12/4/07, andy <[EMAIL PROTECTED]> wrote: > > ls -l /sbin is all > > > > -rwxr-xr-x 1 root root ... > > I understand this issue. What I don't get is why it seems to be the > overall default that others may read and execute files in

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Nyizsnyik Ferenc
On Wed, 5 Dec 2007 16:58:59 +0100 "Martin Marcher" <[EMAIL PROTECTED]> wrote: > Hi, > > jumping in. > > On 12/4/07, andy <[EMAIL PROTECTED]> wrote: > > ls -l /sbin is all > > > > -rwxr-xr-x 1 root root ... > > I understand this issue. What I don't get is why it seems to be the > overall defau

Re: permissions in /sbin

2007-12-05 Thread Douglas A. Tutty
On Wed, Dec 05, 2007 at 07:51:55AM -0600, John Hasler wrote: > andy writes: > > OK - but according to RUTE sbin = "Superuser binary executables. > > The "s" is for "system", not for "superuser". > > > These are programs for system administration only. Only the root will > > have these executables

permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Martin Marcher
Hi, jumping in. On 12/4/07, andy <[EMAIL PROTECTED]> wrote: > ls -l /sbin is all > > -rwxr-xr-x 1 root root ... I understand this issue. What I don't get is why it seems to be the overall default that others may read and execute files in most cases. To me it would make sense to have something

Re: permissions in /sbin

2007-12-05 Thread John Hasler
andy writes: > OK - but according to RUTE sbin = "Superuser binary executables. The "s" is for "system", not for "superuser". > These are programs for system administration only. Only the root will > have these executables in their path" ("Rute User's Tutorial & > Exposition", Paul Sheer, 2002; p

Re: permissions in /sbin

2007-12-04 Thread andy
John Hasler wrote: Andy writes: .../sbin keeps those programs that only root can run... No it doesn't. OK - but according to RUTE sbin = "Superuser binary executables. These are programs for system administration only. Only the root will have these executables in their path" ("Rut

Re: permissions in /sbin

2007-12-04 Thread John Hasler
Andy writes: > .../sbin keeps those programs that only root can run... No it doesn't. -- John Hasler -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: permissions in /sbin

2007-12-04 Thread Douglas A. Tutty
On Tue, Dec 04, 2007 at 09:24:24PM +, andy wrote: > Jochen Schulz wrote: > >andy: > > > >>-rwxr-xr-x 1 root root ... > >> > >>Is this really an okay arrangement for the contents of /sbin? > >> > > > >Sure it is. Only root may modify the files and everyone may read and > >execute them. W

Re: permissions in /sbin

2007-12-04 Thread Andrew Sackville-West
On Tue, Dec 04, 2007 at 09:24:24PM +, andy wrote: > Jochen Schulz wrote: >> andy: >> >>> -rwxr-xr-x 1 root root ... >>> >>> Is this really an okay arrangement for the contents of /sbin? >>> >> >> Sure it is. Only root may modify the files and everyone may read and >> execute them. Wha

Re: permissions in /sbin

2007-12-04 Thread andy
Jochen Schulz wrote: andy: -rwxr-xr-x 1 root root ... Is this really an okay arrangement for the contents of /sbin? Sure it is. Only root may modify the files and everyone may read and execute them. What did you expect? J. Fair enough. I just figured that since /sbin keeps those

Re: permissions in /sbin

2007-12-04 Thread Jochen Schulz
andy: > > -rwxr-xr-x 1 root root ... > > Is this really an okay arrangement for the contents of /sbin? Sure it is. Only root may modify the files and everyone may read and execute them. What did you expect? J. -- I use a Playstation to block out the existence of my partner. [Agree] [Disagr

permissions in /sbin

2007-12-04 Thread andy
Hi Skulking through /sbin this evening and I noticed the output to ls -l /sbin is all -rwxr-xr-x 1 root root ... Is this really an okay arrangement for the contents of /sbin? Cheers Andy -- "If they can get you asking the wrong questions, they don't have to worry about the answers."