Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I have a script with permissions -rws--s--x
When i run the script from an user called "user1" the process always run as root.
What is the reason the script run as root and not run as the user who starts the script?
It's because of the "s" bit (setuid permission) - it escalates the process to run as the permission of the owner of the executable (often root) for when a regular user doesn't have permissions to do some system operation. Those are generally to be avoided because if they there's a bug/exploit on it someone can easily get root access to your system. More details here
Related
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 6 years ago.
Improve this question
If I set a couple of settings in my local.conf file in the /devstack folder for example:
ADMIN_PASSWORD=supersecret
DATABASE_PASSWORD=iheartdatabases
RABBIT_PASSWORD=flopsymopsy
SERVICE_PASSWORD=iheartksl
and then run
./stack.sh
but then later want to append this file with some network configurations for example:
FLOATING_RANGE=192.168.1.224/27
FIXED_RANGE=10.11.12.0/24
FIXED_NETWORK_SIZE=256
FLAT_INTERFACE=eth0
will those new setting be applied to the cloud when I run ./unstack.sh and then ./stack.sh?
unstack script stops all your cloud environment
stack script will reconfigure and build cloud from scratch.
If you have problems there is clean.sh script, that destroys every thing that was created.
In your case enough:
./unstack.sh && ./stack.sh
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 7 years ago.
Improve this question
How can I set setuid for a file, that is owned by some other user ?
I tried, setting the profile and changing the USER variable, but doesn't help .
Users can only set the setuid bit on their own files, or root can set them on any file. This is a security feature - if you could set the setuid bit on someone else's file, you could run it to become that user.
It determines who you are based on your actual login ID (you can see this with the id command), not the USER variable or whatever you mean by "setting the profile".
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I want to send a mail to abc#abcd.com when someone is logging in via FTP. I have tried using /etc/pam.d/vsftpd "session optional pam_exec.so /path/to/my/emailing_script.sh" but it doesn't work (i have tested this script in /etc/pam.d/sshd and it works).
Any suggestions?
Thanks in advance.
In order for vsftp to use the pam sessions you need to enable it in the configuration file:
add (or update) the line
session_support=YES
without that line PAM sessions will not be used so your PAM session module will not be run either.
Look for "session_support" on this documentation page.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I know that when a user logs into the AIX server, the system files csh.cshrc and csh.login are called. /etc/passwd also come into the picture. Can someone point me to a document that clearly explains the log in flow for a AIX machine. I mean which files are called and in what order?
This is not really AIX specific but shell specific. What csh does is not the same as what ksh does. If you install bash, it does something different still.
IBM pubs for 6.1 start here. Other versions of pubs have a similar path. In your case, do a search for: login csh
man csh has information about your question as well.
Hope this helps.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 8 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about programming within the scope defined in the help center.
Improve this question
We need to password protect the activities on the crontab, for ex even if we try
crontab -l
or
crontab -e
or
crontab -r
We would have to enter a password to go to the next level(viewing/editing/deleting) even if we are root user.
Kindly suggest some mechanisms.
Thanks.
If you don't trust the root user on your system I would say you have big problems. I don't think there is any way to securely protect anything from root - by definition this user can do what they like, including removing any protection you put in place to try to enfore a password when executing crontab.