On Saturday, January 12, 2002, at 02:46 PM, Hubert Chan wrote:
I think that if you boot into single mode (e.g. type "linux single" at
the LILO prompt), you'll drop into whatever shell is defined for root.
More importantly, will it break if, e.g., fsck fails and drops
you into single-user mod
On Saturday, January 12, 2002, at 02:46 PM, Hubert Chan wrote:
>
> I think that if you boot into single mode (e.g. type "linux single" at
> the LILO prompt), you'll drop into whatever shell is defined for root.
More importantly, will it break if, e.g., fsck fails and drops
you into single-user
On Mon, Jan 14, 2002 at 06:52:49AM -0500, Ivan R. wrote:
> > to, I can see no reason why not giving a user, that has *no* password,
> > a shell.
>
> if a user don t need a shell,
> why should we give him one?
Because a sysadmin could like to execute scripts under this uid via sudo
as he thinks i
On Mon, Jan 14, 2002 at 06:52:49AM -0500, Ivan R. wrote:
> > to, I can see no reason why not giving a user, that has *no* password,
> > a shell.
>
> if a user don t need a shell,
> why should we give him one?
Because a sysadmin could like to execute scripts under this uid via sudo
as he thinks
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Ivan" == \"Ivan R \" writes:
>> Just make sure that you have some way of doing stuff as root
>> (e.g. sudo), and that you don't kill single mode. (Never tried this,
>> but I don't see why you couldn't do this.)
Ivan> ok for sudo, but what do
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Ivan" == \"Ivan R \" writes:
>> Just make sure that you have some way of doing stuff as root
>> (e.g. sudo), and that you don't kill single mode. (Never tried this,
>> but I don't see why you couldn't do this.)
Ivan> ok for sudo, but what d
En réponse à Christian Hammers <[EMAIL PROTECTED]>:
> Apart from the ftp users which (sometimes) need their ftp password to
> be stored in /etc/shadow and thus would making it a valid login
> password
> to, I can see no reason why not giving a user, that has *no* password,
> a shell.
ok, but we
En réponse à Hubert Chan <[EMAIL PROTECTED]>:
> Anything that is not a real user can have its shell set to /bin/false.
> In fact, depending on how your system is set up, you could probably
> even
> set root's shell to /bin/false.
ok
> Just make sure that you have some way
> of doing stuff as roo
En réponse à Christian Hammers <[EMAIL PROTECTED]>:
> Apart from the ftp users which (sometimes) need their ftp password to
> be stored in /etc/shadow and thus would making it a valid login
> password
> to, I can see no reason why not giving a user, that has *no* password,
> a shell.
ok, but w
En réponse à Hubert Chan <[EMAIL PROTECTED]>:
> Anything that is not a real user can have its shell set to /bin/false.
> In fact, depending on how your system is set up, you could probably
> even
> set root's shell to /bin/false.
ok
> Just make sure that you have some way
> of doing stuff as ro
On Fri, Jan 11, 2002 at 10:00:32PM -0500, Hubert Chan wrote:
> So daemon, bin, sys, ftp, www-data, mail, mysql, etc. can probably be
> set to /bin/false. (Why does Debian not do this by default?)
Apart from the ftp users which (sometimes) need their ftp password to
be stored in /etc/shadow and thu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Ivan" == \"Ivan R \" writes:
Ivan> hi all! i want a password file without hole.
Ivan> so i have now in /etc/passwd:
Ivan> root with /bin/bash
Ivan> daemon, bin and sys with /bin/sh
Ivan> sync with /bin/sync
Ivan> normal users with /bin/bash
On Fri, Jan 11, 2002 at 10:00:32PM -0500, Hubert Chan wrote:
> So daemon, bin, sys, ftp, www-data, mail, mysql, etc. can probably be
> set to /bin/false. (Why does Debian not do this by default?)
Apart from the ftp users which (sometimes) need their ftp password to
be stored in /etc/shadow and th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Ivan" == \"Ivan R \" writes:
Ivan> hi all! i want a password file without hole.
Ivan> so i have now in /etc/passwd:
Ivan> root with /bin/bash
Ivan> daemon, bin and sys with /bin/sh
Ivan> sync with /bin/sync
Ivan> normal users with /bin/bas
hi all!
i want a password file
without hole.
so i have now in /etc/passwd:
root with /bin/bash
daemon, bin and sys with /bin/sh
sync with /bin/sync
normal users with /bin/bash
ftp users with /bin/noshell
here i think that s good
but i have some questions :
what about replace /bin/sh for man b
hi all!
i want a password file
without hole.
so i have now in /etc/passwd:
root with /bin/bash
daemon, bin and sys with /bin/sh
sync with /bin/sync
normal users with /bin/bash
ftp users with /bin/noshell
here i think that s good
but i have some questions :
what about replace /bin/sh for man
16 matches
Mail list logo