On Wednesday 10 November 2004 21:49, "Ben Hutchings"
<[EMAIL PROTECTED]> wrote:
> > I feel the need to learn something new today. How could the user replace
> > the root owned files in a directory that they own?
>
> By renaming or unlinking them. Linux treats this as an operation on the
> directo
On Sat, 20 Nov 2004 07:36:05 -0700, Wesley J Landaker <[EMAIL PROTECTED]> wrote:
> On Sunday, 07 November 2004 18:14, [EMAIL PROTECTED] wrote:
> > You just need to add group(access) to that system accounts that you
> > want or that you think that they'll break in unexpected places...
> > Don't you
On Sunday, 07 November 2004 18:14, [EMAIL PROTECTED] wrote:
> You just need to add group(access) to that system accounts that you
> want or that you think that they'll break in unexpected places...
> Don't you think?
Why not do this the other way around; it's much simpler:
e.g. add users you don'
On Sunday, 07 November 2004 18:14, [EMAIL PROTECTED] wrote:
> You just need to add group(access) to that system accounts that you
> want or that you think that they'll break in unexpected places...
> Don't you think?
Why not do this the other way around--it should be much simpler, and
only affect
Michael Graham wrote:
Ben Hutchings wrote:
Christopher Swingley wrote:
Change the ownership and permissions on their .bash_profile and .bashrc
to root:root 644:
-rw-r--r--1 root root 420 Sep 21 13:05
.bash_profile -rw-r--r--1 root root 746 Sep 21
13:05 .ba
On Tue, 09 Nov 2004 17:43:19 -0500, Doug Griswold <[EMAIL PROTECTED]> wrote:
> can upload the changes. You will get tired of that real quick. Other
> than this method there is always a what if factor selinux,chroot,
> virtual server etc...
The point is to minimize the "what if" factors by choos
Don't give them shell access, and don't let them ftp to the server.
Make them email you all the changes so you can browse for bad code.
Then you
can upload the changes. You will get tired of that real quick. Other
than this method there is always a what if factor selinux,chroot,
virtual serve
On Mon, 8 Nov 2004 09:28:10 -0900, Christopher Swingley
<[EMAIL PROTECTED]> wrote:
> Make symbolic links between allowed commands and '/usr/local/rbin'
>
> As I said before, this is just a simple attempt to reduce priviledge.
> There are undoubtably ways around it, some easier than others dependin
On Sun, Nov 07, 2004 at 11:54:40AM -0800, Stephen Le wrote:
> On Sun, 7 Nov 2004 14:41:42 -0500, Stephen Gran <[EMAIL PROTECTED]> wrote:
> > apt-get remove --purge ftp telnet wget gcc
> > rm /usr/bin/ssh /usr/bin/scp
>
> Unfortunately, I can't do that since I still want some users to be
> able to
Christopher Swingley wrote:
This is what I've done when I wanted to reduce the set of commands a
user could run. I'm sure a reasonably competant Unix user could easily
circumvent these restrictions, but it's a good first start, and making
such attempts would result in account suspension.
Chan
Greetings,
* Osamu Aoki <[EMAIL PROTECTED]> [2004-Nov-05 14:13 AKST]:
> On Fri, Nov 05, 2004 at 09:31:21AM -0800, Stephen Le wrote:
> > Is there an easy way to limit the commands a certain group of users
> > can execute?
>
> I never done this but..
>
> Use of chroot with bash started as rbash se
On Mon, Nov 08, 2004 at 03:14:53AM +0200, [EMAIL PROTECTED] wrote:
> > On Fri, Nov 05, 2004 at 07:53:33PM +0200, [EMAIL PROTECTED] wrote:
> >> >In regards to the latter method, would it be possible for me to change
> >> >the group ownership of the commands I don't want users to have access
> >> to
> On Fri, Nov 05, 2004 at 07:53:33PM +0200, [EMAIL PROTECTED] wrote:
>> >In regards to the latter method, would it be possible for me to change
>> >the group ownership of the commands I don't want users to have access
>> to
>> >and revoke execute permission from that group?
>>
>> Yes, you can make
I wrote:
> No need for C. Perl suffices.
Stephen Le writes:
> I should be able to restrict a user's Perl scripts using Apache's
> suEXEC. I don't see how a user would be able to remotely execute a
> compiled C program outside of their priviledges.
I meant that they can do anything with Perl that
On Sun, 7 Nov 2004 14:41:42 -0500, Stephen Gran <[EMAIL PROTECTED]> wrote:
> apt-get remove --purge ftp telnet wget gcc
> rm /usr/bin/ssh /usr/bin/scp
Unfortunately, I can't do that since I still want some users to be
able to access those commands. I just want to restrict access to those
commands
This one time, at band camp, Stephen Le said:
> On Sun, 7 Nov 2004 14:14:16 +, Steve Kemp <[EMAIL PROTECTED]> wrote:
> > Lots of people have commented already, but I've not seen any
> > discussion on why you might want to do this. What kind of bad
> > commands are you trying to prevent?
>
On Sun, 07 Nov 2004 10:10:31 -0600, John Hasler <[EMAIL PROTECTED]> wrote:
> Steve Kemp writes:
> > If you give people the ability to upload CGI scripts, like the perl
> > example you mention, you've already lost - a malicious user could compile
> > some C code statically and exectute that remotely
On Sun, 7 Nov 2004 14:14:16 +, Steve Kemp <[EMAIL PROTECTED]> wrote:
> Lots of people have commented already, but I've not seen any
> discussion on why you might want to do this. What kind of bad
> commands are you trying to prevent?
>
> Most of the dangerous commands like fdisk, etc, w
Steve Kemp writes:
> If you give people the ability to upload CGI scripts, like the perl
> example you mention, you've already lost - a malicious user could compile
> some C code statically and exectute that remotely.
No need for C. Perl suffices.
--
John Hasler
--
To UNSUBSCRIBE, email to [E
also sprach Steve Kemp <[EMAIL PROTECTED]> [2004.11.07.1514 +0100]:
> If you're operating a shared system and want to keep seperate
> web users isolated from each other using rbash, chroots or
> similar should be sufficient.
Neither rbash not chroots are security measures. They are hurdles at
On Fri, Nov 05, 2004 at 03:35:11PM -0800, Stephen Le wrote:
> See the example above. Users would still be able to upload their own
> Perl scripts and get Apache to execute them without restriction - the
> Perl script could call commands that I want to ban the users from
> executing.
Lots of peo
On Fri, Nov 05, 2004 at 07:53:33PM +0200, [EMAIL PROTECTED] wrote:
> >In regards to the latter method, would it be possible for me to change
> >the group ownership of the commands I don't want users to have access to
> >and revoke execute permission from that group?
>
> Yes, you can make somethin
> On Fri, 5 Nov 2004 19:53:33 +0200 (EET), [EMAIL PROTECTED]
> <[EMAIL PROTECTED]> wrote:
>> Yes, you can make something like that: addgroup(access), then change
>> groupname of commands that you want with that group (access), remember
>> to
>> remove "execute/search by others" from commands that a
On 06.11.2004 00:35 Stephen Le wrote:
Is there an easy way to limit the commands a certain group of users
can execute?
Indeed. A chroot would only apply to a user if they were logged into
the system. Let's say I wanted to prevent users executing the command
"bad_command". Well, if "bad_command" wa
On Sat, 6 Nov 2004 00:13:28 +0100, Osamu Aoki <[EMAIL PROTECTED]> wrote:
> > Is there an easy way to limit the commands a certain group of users
> > can execute? I've looked at chroot, and it's too complicated for my
> > needs and seems too easy to circumvent; users will be able to upload
> > their
On Fri, Nov 05, 2004 at 09:31:21AM -0800, Stephen Le wrote:
> Hello all,
>
> Is there an easy way to limit the commands a certain group of users
> can execute? I've looked at chroot, and it's too complicated for my
> needs and seems too easy to circumvent; users will be able to upload
> their own
What about rbash? Not perfect by any means.
Doug Griswold
Unix/Linux Support
SC Office of the CIO
(803)896-0153
>>> Mark Bucciarelli <[EMAIL PROTECTED]> 11/05/04 4:43 PM >>>
On Friday 05 November 2004 16:19, Stephen Le wrote:
> I don't think sudo is appropriate for what I'm trying to do. I'd lik
On Fri, 5 Nov 2004 16:43:17 -0500, Mark Bucciarelli
<[EMAIL PROTECTED]> wrote:
> google vserver for one option.
If anything, using a virtual server setup would be akin to using an
elaborate chroot. As I mentioned in my original message, using a
chroot would be too complicated for my needs. A vserv
On Friday 05 November 2004 16:19, Stephen Le wrote:
> I don't think sudo is appropriate for what I'm trying to do. I'd like
> users to have limited shell access; I'm not trying to give them access
> to special commands. Besides, telling users to prefix every command
> they run with 'sudo' would be
On Fri, 5 Nov 2004 18:40:59 +0100, Benedict Verheyen
<[EMAIL PROTECTED]> wrote:
> Sounds like you want sudo.
I don't think sudo is appropriate for what I'm trying to do. I'd like
users to have limited shell access; I'm not trying to give them access
to special commands. Besides, telling users to p
On Fri, 5 Nov 2004 19:53:33 +0200 (EET), [EMAIL PROTECTED]
<[EMAIL PROTECTED]> wrote:
> Yes, you can make something like that: addgroup(access), then change
> groupname of commands that you want with that group (access), remember to
> remove "execute/search by others" from commands that are with
>
Take a look at sudo.
>>> Stephen Le <[EMAIL PROTECTED]> 11/5/2004 12:31:21 PM >>>
Hello all,
Is there an easy way to limit the commands a certain group of users
can execute? I've looked at chroot, and it's too complicated for my
needs and seems too easy to circumvent; users will be able to upload
>-Oorspronkelijk bericht-
>Van: Stephen Le [mailto:[EMAIL PROTECTED]
>Verzonden: vrijdag 5 november 2004 18:31
>Aan: [EMAIL PROTECTED]; [EMAIL PROTECTED]
>Onderwerp: Limiting User Commands
>
>
>Hello all,
>
>Is there an easy way to limit the commands a certa
> Hello all,
>
> Is there an easy way to limit the commands a certain group of users
> can execute? I've looked at chroot, and it's too complicated for my
> needs and seems too easy to circumvent; users will be able to upload
> their own Perl scripts, so it seems that they'll be able to access
> co
Hello all,
Is there an easy way to limit the commands a certain group of users
can execute? I've looked at chroot, and it's too complicated for my
needs and seems too easy to circumvent; users will be able to upload
their own Perl scripts, so it seems that they'll be able to access
commands outsid
35 matches
Mail list logo