On Thu, Jan 31, 2002 at 11:03:08AM -0700, Stefan Srdic wrote:
>
> Take a look at the Debian Policy Manual, they might discribe system accounts
> in there.
AFAIK it does, and so does the "Debian Security HOWTO" (see
www.debian.org/doc/ddp). This is, a matter of fact in the FAQ section.
On Thu, Jan 31, 2002 at 11:03:08AM -0700, Stefan Srdic wrote:
>
> Take a look at the Debian Policy Manual, they might discribe system accounts
> in there.
AFAIK it does, and so does the "Debian Security HOWTO" (see
www.debian.org/doc/ddp). This is, a matter of fact in the FAQ section.
On Thursday 31 January 2002 20:30, [EMAIL PROTECTED] wrote:
> Hello All
>
> I have been trying to get info on how various
> programs use the file /
> etc/passwd but without
> much success.
>
> What I want to know is which accounts in my
> /etc/passwd file it is safe to
Hello All
I have been trying to get info on how various
programs use the file /etc/passwd but without
much success.
What I want to know is which accounts in my
/etc/passwd file it is safe to delete.
I was hoping to find some info on how various programs
use this file so that I would better
On Thursday 31 January 2002 20:30, [EMAIL PROTECTED] wrote:
> Hello All
>
> I have been trying to get info on how various
> programs use the file /
> etc/passwd but without
> much success.
>
> What I want to know is which accounts in my
> /etc/passwd file it is safe to
Hello All
I have been trying to get info on how various
programs use the file /etc/passwd but without
much success.
What I want to know is which accounts in my
/etc/passwd file it is safe to delete.
I was hoping to find some info on how various programs
use this file so that I would better
On Saturday, January 12, 2002, at 02:46 PM, Hubert Chan wrote:
I think that if you boot into single mode (e.g. type "linux single" at
the LILO prompt), you'll drop into whatever shell is defined for root.
More importantly, will it break if, e.g., fsck fails and drops
you into single-user mod
On Saturday, January 12, 2002, at 02:46 PM, Hubert Chan wrote:
>
> I think that if you boot into single mode (e.g. type "linux single" at
> the LILO prompt), you'll drop into whatever shell is defined for root.
More importantly, will it break if, e.g., fsck fails and drops
you into single-user
i thing a linux distribution like the debian
> must be "coherent" : why www-data and mail have got a shell
> and not mysql???
Well, um, I as the mysql maintainer should be able to tell it but mainly
I guess because I was told (years ago) the same thing about "/bin/bash" in
i thing a linux distribution like the debian
> must be "coherent" : why www-data and mail have got a shell
> and not mysql???
Well, um, I as the mysql maintainer should be able to tell it but mainly
I guess because I was told (years ago) the same thing about "/bin/bash" in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Ivan" == \"Ivan R \" writes:
>> Just make sure that you have some way of doing stuff as root
>> (e.g. sudo), and that you don't kill single mode. (Never tried this,
>> but I don't see why you couldn't do this.)
Ivan> ok for sudo, but what do
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> "Ivan" == \"Ivan R \" writes:
>> Just make sure that you have some way of doing stuff as root
>> (e.g. sudo), and that you don't kill single mode. (Never tried this,
>> but I don't see why you couldn't do this.)
Ivan> ok for sudo, but what d
nd not mysql???
it s just a principle for me :D
> Without a password in /etc/shadow or /etc/passwd he could not login
> and
> if someone cracks the server with i.e. a buffer overflow he does not
> depend on the passwd entries but executes /bin/bash directly.
ok, that s right
etc. can probably be
> set to /bin/false. (Why does Debian not do this by default?)
i just tried to put /bin/false in /etc/passwd for ftp, www-data, mysql, man
and that s ok. i ll try to do so for daemon, bin and sys at home
(i prefer than to do this at work :p)
> I don't know what
ll
and not mysql???
it s just a principle for me :D
> Without a password in /etc/shadow or /etc/passwd he could not login
> and
> if someone cracks the server with i.e. a buffer overflow he does not
> depend on the passwd entries but executes /bin/bash directly.
ok, that s right
etc. can probably be
> set to /bin/false. (Why does Debian not do this by default?)
i just tried to put /bin/false in /etc/passwd for ftp, www-data, mysql, man
and that s ok. i ll try to do so for daemon, bin and sys at home
(i prefer than to do this at work :p)
> I don't know what
ow and thus would making it a valid login password
to, I can see no reason why not giving a user, that has *no* password,
a shell.
Without a password in /etc/shadow or /etc/passwd he could not login and
if someone cracks the server with i.e. a buffer overflow he does not
depend on the passwd entri
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
>>>>> "Ivan" == \"Ivan R \" writes:
Ivan> hi all! i want a password file without hole.
Ivan> so i have now in /etc/passwd:
Ivan> root with /bin/bash
Ivan> daemon, bin and sys with /bin/sh
Ivan>
ow and thus would making it a valid login password
to, I can see no reason why not giving a user, that has *no* password,
a shell.
Without a password in /etc/shadow or /etc/passwd he could not login and
if someone cracks the server with i.e. a buffer overflow he does not
depend on the passwd entri
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
>>>>> "Ivan" == \"Ivan R \" writes:
Ivan> hi all! i want a password file without hole.
Ivan> so i have now in /etc/passwd:
Ivan> root with /bin/bash
Ivan> daemon, bin and sys with /bin/sh
Ivan>
hi all!
i want a password file
without hole.
so i have now in /etc/passwd:
root with /bin/bash
daemon, bin and sys with /bin/sh
sync with /bin/sync
normal users with /bin/bash
ftp users with /bin/noshell
here i think that s good
but i have some questions :
what about replace /bin/sh for man
hi all!
i want a password file
without hole.
so i have now in /etc/passwd:
root with /bin/bash
daemon, bin and sys with /bin/sh
sync with /bin/sync
normal users with /bin/bash
ftp users with /bin/noshell
here i think that s good
but i have some questions :
what about replace /bin/sh for man
they won't be able to login into the machine no more..
>
> >I was wandering if I edited my /etc/passwd file and replaced all the
> >/bin/sh to /bin/false , will that break anything?
> >What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a
> >slew of others that I dont use.
> >
aniel Rychlik wrote:
I was wandering if I edited my /etc/passwd file and replaced all the
/bin/sh to /bin/false , will that break anything?
What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a
slew of others that I dont use.
Thanks in advance Debian Guruz!
Daniel
Petre L. Daniel,S
I was wandering if I edited my /etc/passwd file and
replaced all the /bin/sh to /bin/false , will that break anything?
What Im seeing is accounts like lp, games, uucp,
proxy, postgres, and a slew of others that I dont use.
Thanks in advance Debian Guruz!
Daniel
they won't be able to login into the machine no more..
>
> >I was wandering if I edited my /etc/passwd file and replaced all the
> >/bin/sh to /bin/false , will that break anything?
> >What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a
> >slew
aniel Rychlik wrote:
>I was wandering if I edited my /etc/passwd file and replaced all the
>/bin/sh to /bin/false , will that break anything?
>What Im seeing is accounts like lp, games, uucp, proxy, postgres, and a
>slew of others that I dont use.
>
>Thanks in advance Debian Guruz!
&
I was wandering if I edited my /etc/passwd file and
replaced all the /bin/sh to /bin/false , will that break anything?
What Im seeing is accounts like lp, games, uucp,
proxy, postgres, and a slew of others that I dont use.
Thanks in advance Debian Guruz!
Daniel
28 matches
Mail list logo