Re: Default group

2012-10-17 Thread Alberto Gonzalez

 To modify the groups a user is in, you must have administrative access

You can use gpasswd -A to delegate group administration to a non-superuser.

And the main reason of User Private Group (UPG) is that makes it easy to
create directories for collaboration.

2012/10/17 John Moser john.r.mo...@gmail.com

 On Wed, Oct 17, 2012 at 10:05 AM, Jordon Bedwell jor...@envygeeks.com
 wrote:
 
  The problem with this is how are you going to fix permissions on bad
  software like Ruby Gems who do not reset permissions when packaging
  and uploading to the public repository (because they claim this would
  violate security even though it comes from a public repo like the
  Debian repo and having public read and execute on a public gem from a
  public place is bad.) This has a huge impact as a default permission
  for not just examples like Ruby gems but other software do not reset
  when packaging, making it more cumbersome to package software and
  making it so now work around's are the rule and not the exception.

 Explain the problem more.  The directory the user is in would be owned
 by $USER:users instead of $USER:$USER.  The only difference, then, is
 instead of your stuff being owned by jordon:jordon it's owned by
 jordon:users.

 What you're saying here is... I don't know what you're saying.
 Permissions are currently $USER:users by default with umask=022 and
 $HOME permissions of 755 which means every file is created as:

 drwxr-xr-x jordan:jordan /home/jordan
 drwxr-xr-x jordan:jordan /home/jordan/somedir
 -rwxr--r-- jordan:jordan /home/jordan/somefile

 What I'm suggesting is either umask=022 with a shared 'users' group
 and a default $HOME permission of 700, so

 drwx-- jordan:users /home/jordan
 drwxr-xr-x jordan:users /home/jordan/somedir
 -rwxr--r-- jordan:users /home/jordan/somefile

 In which case if you give the 'users' group or (via extended ACL) any
 other group or person read/execute on /home/jordan they can read
 everything:  they're in 'users' and thus have access to your files,
 just before they couldn't actually reach the inode.  If you give
 'others' read/execute on /home/jordan then everyone on the system can
 see inside your $HOME, as is the case now.


 ...OR--more risky--a default umask=027 with a shared 'users' group and
 a default $HOME permission of 700, so

 drwx-- jordan:users /home/jordan
 drwxr-x--- jordan:users /home/jordan/somedir
 drwxr- jordan:users /home/jordan/somefile

 and security is increased, nominally, but honestly not much.  The
 security boost here is files created in shared directories or
 hardlinks created won't let anyone and everyone read those files; the
 truth of the matter is that shouldn't happen, and stuff done in /tmp
 is usually ... temporary, and aware of the security implications.
 More restrictive you could umask=077, but same deal, and then if you
 want to give anyone access to your files you have to change
 permissions the whole way down (which opens up the user to mistakes
 like chmod -R on $HOME and exposing their SSH keys).


 How does putting everyone in the same group and changing $HOME to 0700
 do what you said?

 --
 Ubuntu-devel-discuss mailing list
 Ubuntu-devel-discuss@lists.ubuntu.com
 Modify settings or unsubscribe at:
 https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss




-- 
-
The greatest harm can result from the best intentions
-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss


Re: Ping! OpenVPN with LDAP+TLS authentication runs into file exhaustion

2009-12-09 Thread Alberto Gonzalez Iniesta
On Sun, Nov 08, 2009 at 10:13:52AM +0100, Lars Ellenberg wrote:
 
 BTW: you may also document this workaround as an easy ad-hoc hot-fix:
 
   LD_PRELOAD=/lib/security/pam_ldap.so  openvpn ...
 
 which does exactly the same: get some extra references on the
 libraries involved.

Added a note to openvpn's README.Debian. 
Thanks all for looking into this.


-- 
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com

Key fingerprint = 9782 04E7 2B75 405C F5E9  0C81 C514 AF8E 4BA4 01C3

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss