In a message dated 10/25/00 6:53:44 PM Eastern Daylight Time, [EMAIL PROTECTED] 
writes:

> 
>  After I install new debian boxes the permissions are always something
>  like 755. This is bad in my opinion, for a multiuser box. On firewalls,
>  however, there should be very few people logging in at all and then only
>  to administer the box, not to read mail or anything like that. Therefore
>  this isn't much of an issue for firewall installs.
>  
>  Does anyone know why debian has such lax perms on home dirs?
>  


The way "we" have handled this (for many years) is:

write a crummy little shell script to add your desire to a command (later you 
can add more and have it ask you to choose what you want it to do and then 
execute some block of commands accordingly)

chmod that file for the maximum restrictions of it's power (which can/should 
have some added additional sensible defaults and traps inside it, you add 
these after it works w/a single chmod of $1 or etc., while it's still 
crummy/little, then as it gets bigger you can always re-place its function in 
additional files/calls)

mkdir /usr/local/sbin or better /usr/local/adm/sec

chmod that so that ONLY you can "see" it (x permission on a directory is 
search/see ability for ug&o; no w for anyone (you chmod write perm for yoy 
only, back "onto" for any maint. session (and inside the script, make sure it 
exits AND traps w/re-set/affirm chmods on script(s) and dir)

for your usual userid (this should be root only, unless you have a semi-root 
trust/power system; or create new user to just do these types of things by 
user/group tuple

        whom have their PATH be the only PATH that puts the created dir within

        consider calling it "adduser" and putting it in the dir mentioned 
above, on your path before the real adduser
            so it first calls the real adduser and then does/adds your other 
stuff too (pre/post/whatever actually, even redirect output strings to logs 
of              before/after copies)

Reply via email to