Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-11 Thread David Wright
On Wed 11 May 2022 at 20:26:20 (+0200), to...@tuxteam.de wrote: > On Wed, May 11, 2022 at 11:07:09AM -0500, David Wright wrote: > > [...] > > > But after two posts about background information on setuid shell > > scripts, you now write "the worst antipattern is to misuse tech > > to force people

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-11 Thread tomas
On Wed, May 11, 2022 at 11:07:09AM -0500, David Wright wrote: [...] > But after two posts about background information on setuid shell > scripts, you now write "the worst antipattern is to misuse tech > to force people to follow some nonsensical rituals". Strong words. Sorry if I was unclear. Th

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-11 Thread David Wright
On Wed 11 May 2022 at 07:05:47 (+0200), to...@tuxteam.de wrote: > On Tue, May 10, 2022 at 10:08:20PM -0500, David Wright wrote: > > On Tue 10 May 2022 at 17:12:25 (-0600), Charles Curley wrote: > > [...] > > > IOW, though logging in to root by password is ok at the console, > > it's not ok when r

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-11 Thread Dan Ritter
Charles Curley wrote: > On Tue, 10 May 2022 11:08:23 -0500 > David Wright wrote: > > > That complicates unlocking partitions remotely because, even if you > > can log in as root, you normally can't log in remotely as root. > > ??? I log in as root over SSH all the time. Most sshd configs eithe

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-10 Thread tomas
On Tue, May 10, 2022 at 10:08:20PM -0500, David Wright wrote: > On Tue 10 May 2022 at 17:12:25 (-0600), Charles Curley wrote: [...] > IOW, though logging in to root by password is ok at the console, > it's not ok when remote. ➀ I assume you know all that you can set "PermitRootLogin yes" in your

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-10 Thread David Wright
On Tue 10 May 2022 at 17:12:25 (-0600), Charles Curley wrote: > On Tue, 10 May 2022 11:08:23 -0500 > David Wright wrote: > > > That complicates unlocking partitions remotely because, even if you > > can log in as root, you normally can't log in remotely as root. > > ??? I log in as root over SSH

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-10 Thread Greg Wooledge
On Tue, May 10, 2022 at 05:12:25PM -0600, Charles Curley wrote: > David Wright wrote: > > I use a special user called unlock, whose home directory is on > > /var/local/, to unlock my /home partitions: > > Unlock? What does "unlock" mean in this context? It looks like a > synonym for "mount". If s

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-10 Thread Charles Curley
On Tue, 10 May 2022 11:08:23 -0500 David Wright wrote: > That complicates unlocking partitions remotely because, even if you > can log in as root, you normally can't log in remotely as root. ??? I log in as root over SSH all the time. > > I use a special user called unlock, whose home director

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-10 Thread David Wright
On Tue 10 May 2022 at 13:02:41 (-0400), Greg Wooledge wrote: > On Tue, May 10, 2022 at 11:08:23AM -0500, David Wright wrote: [> > On Tue 10 May 2022 at 08:21:00 (-0600), Charles Curley wrote:] > > > Why the aversion to doing things as root? Why not just run your scripts > > > as root? This is exa

Re: Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-10 Thread Greg Wooledge
On Tue, May 10, 2022 at 11:08:23AM -0500, David Wright wrote: > > On Tue, 10 May 2022 07:50:18 -0400 rhkra...@gmail.com wrote: > > Why the aversion to doing things as root? Why not just run your scripts > > as root? This is exactly the sort of thing that is reserved to root for > > reasons of secur

Re: Help with suid (bash)

2022-05-10 Thread rhkramer
On Tuesday, May 10, 2022 10:21:00 AM Charles Curley wrote: > Why the aversion to doing things as root? Why not just run your scripts > as root? This is exactly the sort of thing that is reserved to root for > reasons of security. I may think about that some more, but it is a general aversion to be

Unlocking (remote/local), was Re: Help with suid (bash)

2022-05-10 Thread David Wright
On Tue 10 May 2022 at 08:21:00 (-0600), Charles Curley wrote: > On Tue, 10 May 2022 07:50:18 -0400 rhkra...@gmail.com wrote: > > > Background: 8 years ago I wrote a set of scripts to help me mount and > > unmount LUKS encrypted partitions as needed and as myself > > () rather than as root. > > W

Re: Help with suid (bash)

2022-05-10 Thread Charles Curley
On Tue, 10 May 2022 07:50:18 -0400 rhkra...@gmail.com wrote: > Background: 8 years ago I wrote a set of scripts to help me mount and > unmount LUKS encrypted partitions as needed and as myself > () rather than as root. Why the aversion to doing things as root? Why not just run your scripts as ro

Followup: Re: Resolved: Re: Help with suid (bash)

2022-05-10 Thread rhkramer
By the way, thanks to all who replied! One followup below. On Tuesday, May 10, 2022 08:20:10 AM rhkra...@gmail.com wrote: > Ok, thanks very much! > > That resolves that -- I do have another way of doing it (the c helper > program), I just don't like it -- I'll probably continue to use that but >

Re: Help with suid (bash)

2022-05-10 Thread tomas
On Tue, May 10, 2022 at 07:58:39AM -0400, Greg Wooledge wrote: > On Tue, May 10, 2022 at 07:50:18AM -0400, rhkra...@gmail.com wrote: > > Aside: even though this is not a Debian specific question, I often use > > debian- > > user as my first resource in asking Linux questions. > > It's Linux-speci

Resolved: Re: Help with suid (bash)

2022-05-10 Thread rhkramer
(Intentionally top posting) Ok, thanks very much! That resolves that -- I do have another way of doing it (the c helper program), I just don't like it -- I'll probably continue to use that but think about alternatives. On Tuesday, May 10, 2022 07:58:39 AM Greg Wooledge wrote: > The Linux ker

Re: Help with suid (bash)

2022-05-10 Thread tomas
On Tue, May 10, 2022 at 07:50:18AM -0400, rhkra...@gmail.com wrote: > Aside: even though this is not a Debian specific question, I often use debian- > user as my first resource in asking Linux questions. > > Background: 8 years ago I wrote a set of scripts to help me mount and unmount > LUKS encr

Re: Help with suid (bash)

2022-05-10 Thread Greg Wooledge
On Tue, May 10, 2022 at 07:50:18AM -0400, rhkra...@gmail.com wrote: > Aside: even though this is not a Debian specific question, I often use debian- > user as my first resource in asking Linux questions. It's Linux-specific, though. > -rwsr-xr-x 1 root 1412 Aug 31 2014 > The Linux kernel doe

Help with suid (bash)

2022-05-10 Thread rhkramer
working as intended (that is, using suid) is part of my effort to do that. Problem: I tried to use suid to allow the scripts to be run by me, but with the permissions of root but I could not get that to work. Aside: I do run those scripts with the aid of a (compiled) c helper program that

Re: ptrace suid?

2012-01-16 Thread Camaleón
confess to being a little bit mystified by the description > there (I'll note that the user was having exactly the same debugging > problem I am -- a wild goose chase caused by suid being ignored in > strace!). The user also reports the result of strace output. Is that not working

Re: ptrace suid?

2012-01-15 Thread Joe Pfeiffer
gs are now working. I'd still be curious to find a way to re-enable suid with ptrace when necessary -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://li

Re: ptrace suid?

2012-01-15 Thread Joe Pfeiffer
having exactly the same debugging problem I am -- a wild goose chase caused by suid being ignored in strace!). The fix reported there was >Re: VBox 4.1.8 fails as non-root user >by Perryg » 8. Jan 2012, 23:32 >If you started VirtualBox as root then the VBOX_USER_HOME environment has >p

Re: ptrace suid?

2012-01-15 Thread Camaleón
On Fri, 13 Jan 2012 13:23:23 -0700, Joe Pfeiffer wrote: > I've got a very strange virtualbox problem: I have two hosts sharing > /home with NFS. The two machines are very close to identical: same > CPU, same motherboard, same amount of memory. Same kernel version, same > virtualbox version, sa

ptrace suid?

2012-01-13 Thread Joe Pfeiffer
ember of vboxusers on both machines. I'm at a stage of frustration where I want to run strace to try to see where the seg fault is happening. Unfortunately, due to a past exploit, suid bits are silently ignored when ptrace is active, so when I run it with strace I get an error to the effect t

Re: suid, www-data user, and gui program amarok, not working together.

2010-02-03 Thread Thomas Anderson
>> Why can't the binary execute "amarok -t" when it is confirmed that it >> is indeed running as user "tommy"? > > X doesn't authenticate connections based on uid.  (For one thing, connections > need not be from the local machine.  But uid is not used even on the same > machine.)  Read the manpage

Re: suid, www-data user, and gui program amarok, not working together.

2010-02-02 Thread Boyd Stephen Smith Jr.
On Tuesday 02 February 2010 17:14:31 Thomas Anderson wrote: > Why can't the binary execute "amarok -t" when it is confirmed that it > is indeed running as user "tommy"? X doesn't authenticate connections based on uid. (For one thing, connections need not be from the local machine. But uid is no

suid, www-data user, and gui program amarok, not working together.

2010-02-02 Thread Thomas Anderson
I'm trying to make a web page that has buttons to control my running music player application "Amarok" (Amarok is a Debian package). I can control it from the command line by issuing this command: $ amarok -t That command toggles the music on and off. I run Apache2 on Debian Lenny and the comman

Re: cdrecord wihout SUID

2006-08-09 Thread José Alburquerque
José Alburquerque wrote: Does anyone know a way for regular users to use cdrecord for CD writing/blanking without the need for it to setuid? Any pointers would be greatly appreciated. Thanks! Just thought I'd let everyone know, I think I'll just be using cdrecord as it is. I'll keep all

Re: cdrecord wihout SUID

2006-08-09 Thread José Alburquerque
David E. Fox wrote: On Tue, 8 Aug 2006 16:55:54 -0600 "Dwayne C. Litzenberger" <[EMAIL PROTECTED]> wrote: Also be CAREFUL. On my system, /usr/bin/cdrecord is a SHELL SCRIPT, and SUID-root shell scripts are a big security hole, IIRC. You probably want to set the permiss

Re: cdrecord wihout SUID

2006-08-08 Thread Dwayne C. Litzenberger
On Tue, Aug 08, 2006 at 08:53:35PM -0700, David E. Fox wrote: To the OP - you can, I suppose, chmod the /usr/bin/cdrecord to regular non-suid (chmod 750 /usr/bin/cdrecord). I notice the permissions here for it are -rwsr-xr-- implying that others can read the binary, but not execute it. (2754 in

Re: cdrecord wihout SUID

2006-08-08 Thread Mumia W.
On 08/08/2006 12:32 AM, Mike McCarty wrote: Mumia W. wrote: [...] Sudo is the only alternative to making cdrecord SUID root. And a very viable one. Mike But people should know that they would have to create a special script to run cdrecord under sudo, or it would be less safe than SUID

Re: cdrecord wihout SUID

2006-08-08 Thread David E. Fox
On Tue, 8 Aug 2006 16:55:54 -0600 "Dwayne C. Litzenberger" <[EMAIL PROTECTED]> wrote: > > Also be CAREFUL. On my system, /usr/bin/cdrecord is a SHELL SCRIPT, and > SUID-root shell scripts are a big security hole, IIRC. You probably want > to set the permissio

Re: cdrecord wihout SUID

2006-08-08 Thread David E. Fox
(sarge defautl kernel) but not in later ones. As the other poster said, it has to do supposedly with priviieged IOCTLs and kernel-level things. I'm running etch (kernel 2.6.15.1-k7 actually). People running 2.4.x may not have to have this requirement of

Re: cdrecord wihout SUID

2006-08-08 Thread David E. Fox
as a regular user, and it is indeed suid root here. At least in Debian -land this is the case, and it's been a while since I ran cdrecord on non-Debian systems. To the OP - you can, I suppose, chmod the /usr/bin/cdrecord to regular non-suid (chmod 750 /usr/bin/cdrecord). I notice the permission

Re: cdrecord wihout SUID

2006-08-08 Thread Dwayne C. Litzenberger
On Tue, Aug 08, 2006 at 12:32:49AM -0500, Mike McCarty wrote: The user won't get much mileage out of it either. Sudo is the only alternative to making cdrecord SUID root. And a very viable one. And it opens up a rather large security hole. cdrecord is designed to be made suid-root; It

Re: cdrecord wihout SUID

2006-08-08 Thread Dwayne C. Litzenberger
On Tue, Aug 08, 2006 at 12:49:27PM -0400, José Alburquerque wrote: The setuid-root sollution (give only the group executable rights, make it suid root), please note that this is a security risk - you have been warned): 1) create a group and add users as above 2) remove world executable from

Re: cdrecord wihout SUID

2006-08-08 Thread José Alburquerque
José Alburquerque wrote: s. keeling wrote: Very odd, on both of you. (0) heretic /home/keeling_ all `which cdrecord` -rwxr-xr-x 1 root root 133 2005-01-09 09:55 /usr/bin/cdrecord* No SUID needed. (0) heretic /home/keeling_ id uid=1000(keeling) gid=1000(keeling) groups=20(dialout),24(cdrom

Re: cdrecord wihout SUID

2006-08-08 Thread José Alburquerque
roblem is that I'd like cdrecord not to have the SUID set (the 's' in '-rwsr-xr--' above). I'm not sure this is possible, but if it is and Very odd, on both of you. (0) heretic /home/keeling_ all `which cdrecord` -rwxr-xr-x 1 root root 133 2005-01-09 09:5

Re: cdrecord wihout SUID

2006-08-08 Thread Mumia W.
On 08/07/2006 03:52 PM, Mumia W. wrote: [...] Sudo is the only alternative to making cdrecord SUID root. Oops. Evidently that isn't the only alternative. Others have posted that they've run cdrecord without SUID root. Oh well, on my kernel SUID root is required. -- To U

Re: cdrecord wihout SUID

2006-08-07 Thread Mike McCarty
Mumia W. wrote: I find it hard to believe that this works. I tried that too and discovered that running cdrecord SUID root is a requirement; cdrecord uses privileged IOCTLS (whatever they are). IOCTL - Input/Output ConTroL This does direct communication with the device driver. In this case

Re: cdrecord wihout SUID

2006-08-07 Thread Mumia W.
On 08/07/2006 02:39 PM, Glenn English wrote: José Alburquerque wrote: My problem is that I'd like cdrecord not to have the SUID set (the 's' in '-rwsr-xr--' above). I'm not sure this is possible, but if it is and someone out there knows, I'd really appreci

Re: cdrecord wihout SUID

2006-08-07 Thread s. keeling
gt; permissions and everything works fine like this: > > [EMAIL PROTECTED]:~$ ll `which cdrecord` > -rwsr-xr-- 1 root cdrom 133 2006-01-07 13:43 /usr/bin/cdrecord* > > My problem is that I'd like cdrecord not to have the SUID set (the 's' > in '-rwsr-x

Re: cdrecord wihout SUID

2006-08-07 Thread Eduard Bloch
of that... > > Note, however, that if cdrecord doesn't run SUID root, it can't get > realtime scheduling priority, so you could run into buffer underruns on a > slow or heavily-loaded system. It is not only about priorities. In fact most modern systems are overpowered

Re: cdrecord wihout SUID

2006-08-07 Thread José Alburquerque
#x27;t run SUID root, it can't get realtime scheduling priority, so you could run into buffer underruns on a slow or heavily-loaded system. Makes a lot of sense. Thank you both very much. Sincerely Jose -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe"

Re: cdrecord wihout SUID

2006-08-07 Thread Dwayne C. Litzenberger
On Mon, Aug 07, 2006 at 01:39:43PM -0600, Glenn English wrote: If you want to do it without the extra group, just make the burner world write-able. I don't see how a cracker could get much mileage out of that... Note, however, that if cdrecord doesn't run SUID root, it can'

Re: cdrecord wihout SUID

2006-08-07 Thread Glenn English
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 José Alburquerque wrote: > My problem is that I'd like cdrecord not to have the SUID set (the 's' > in '-rwsr-xr--' above). I'm not sure this is possible, but if it is and > someone out there knows, I'

Re: cdrecord wihout SUID

2006-08-07 Thread José Alburquerque
PROTECTED]:~$ ll `which cdrecord` -rwsr-xr-- 1 root cdrom 133 2006-01-07 13:43 /usr/bin/cdrecord* My problem is that I'd like cdrecord not to have the SUID set (the 's' in '-rwsr-xr--' above). I'm not sure this is possible, but if it is and someone out there knows,

Re: cdrecord wihout SUID

2006-08-06 Thread Matej Cepl
José Alburquerque wrote: > Does anyone know a way for regular users to use cdrecord for CD > writing/blanking without the need for it to setuid? Any pointers would > be greatly appreciated. Thanks! I think you need to have at leas this: chelcicky:~$ ll `which cdrecord` -rwsr-xr-- 1 root cdrom 1

cdrecord wihout SUID

2006-08-06 Thread José Alburquerque
Does anyone know a way for regular users to use cdrecord for CD writing/blanking without the need for it to setuid? Any pointers would be greatly appreciated. Thanks! Sincerely Jose Alburquerque -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact

update of perl suid

2004-05-08 Thread Paulo Henrique B de Oliveira
Hi all, I have a Debian woody system and updated perl-suid package (from 5.6.1-8.2 to 5.6.1-8.7). I used neomail webmail and the following error occurs now: "fd script not allowed in suidperl" How I can fix this? TIA, Paulo Henrique -- To UNSUBSCRIBE, email to [EMAIL PROTECTE

X: server must be suid root

2003-09-01 Thread Brian Stults
n run X as root just fine. But when I try to run it as a user, I get the following errors in /var/log/XFree86.0.log: (WW) xf86ReadBIOS: Failed to open /dev/mem (Operation not permitted) Fatal server error: xf86OpenConsole: Server must be suid root Here is some info: XFree86 Version 4.2.1.1 ha

server must be suid root

2003-08-30 Thread Brian Stults
error: xf86OpenConsole: Server must be suid root Here is some info: XFree86 Version 4.2.1.1 hardin:/usr/X11R6/bin# ls -l X* -rwsr-sr-x1 root root 7476 Aug 29 11:30 X -rwsr-sr-x1 root root 1584152 Aug 29 11:30 XFree86 -rwxr-xr-x1 root root27494 Aug 29 11:26

Re: cdrecord: behaves as if not suid root when it is, sorta.

2003-06-04 Thread Ryan Nowakowski
When cdrecord is run suid root it will work. However, it won't have access to the function setpriority() listed below. If you want to do away with those errors, you will have to run cdrecord as root (ex: sudo cdrecord) - Ryan On Tue, Jun 03, 2003 at 01:39:40PM -0400, Chris Metzler

cdrecord: behaves as if not suid root when it is, sorta.

2003-06-04 Thread Chris Metzler
ion denied. WARNING: Cannot set priority using setpriority(). cdrecord: WARNING: This causes a high risk for buffer underruns. >From searching the web/newsgroups, I can see that this is fairly common -- cdrecord needs to be run as root, or as suid root. However, there are a few important differ

Re: Minicom only works suid root -SOLVED

2001-09-20 Thread Anthony Campbell
On 19 Sep 2001, John Hasler wrote: > Anthony writes: > > I have no idea how all this happened, nor do I understand why /dev/ttyS0 > > had originally got incorrect permissions while /dev/ttyS1, etc, were > > correct. > > Pppd once had a bug that caused it to fail to restore the permissions on > the

Re: Minicom only works suid root -SOLVED

2001-09-19 Thread John Hasler
Anthony writes: > I have no idea how all this happened, nor do I understand why /dev/ttyS0 > had originally got incorrect permissions while /dev/ttyS1, etc, were > correct. Pppd once had a bug that caused it to fail to restore the permissions on the serial port. I thought it was fixed long ago, t

Re: SUID

2001-09-19 Thread Nathan E Norman
:27:15 -0400 UTC), Ian Marlier > > > > wrote: > > > > > I feel like an idiot asking this, but how does one set something to > > > > > run SUID? > > > > > > > > chmod u+s To setUID to the user that owns the file > > > > ch

Re: SUID

2001-09-19 Thread csj
feel like an idiot asking this, but how does one set something to > > > > run SUID? > > > > > > chmod u+s To setUID to the user that owns the file > > > chmod g+s To setGID to the group that owns the file > > > > > > Standard disclaimer: Be

Re: Minicom only works suid root -SOLVED

2001-09-19 Thread Anthony Campbell
On 19 Sep 2001, Michael Heldebrant wrote: > On Wed, 2001-09-19 at 08:35, Anthony Campbell wrote: > > On 19 Sep 2001, Carel Fellinger wrote: > > > On Wed, Sep 19, 2001 at 07:51:11AM +0100, Anthony Campbell wrote: > > > > On 18 Sep 2001, Michael Heldebrant wrote: > > > > > On Tue, 2001-09-18 at 10:59

Re: Minicom only works suid root

2001-09-19 Thread Carel Fellinger
On Wed, Sep 19, 2001 at 01:57:06PM +0100, Anthony Campbell wrote: > On 19 Sep 2001, Carel Fellinger wrote: ... > > group ownership: > > > > $ ls -l /dev/ttyS0 > > crw-rw1 root dialout4, 64 Jul 5 2000 /dev/ttyS0 ... > A good suggestion and in fact I found that the permiss

Re: Minicom only works suid root -SOLVED

2001-09-19 Thread Michael Heldebrant
On Wed, 2001-09-19 at 08:35, Anthony Campbell wrote: > On 19 Sep 2001, Carel Fellinger wrote: > > On Wed, Sep 19, 2001 at 07:51:11AM +0100, Anthony Campbell wrote: > > > On 18 Sep 2001, Michael Heldebrant wrote: > > > > On Tue, 2001-09-18 at 10:59, Anthony Campbell wrote: > > > > > I have to have m

Re: Minicom only works suid root -SOLVED

2001-09-19 Thread Anthony Campbell
On 19 Sep 2001, Carel Fellinger wrote: > On Wed, Sep 19, 2001 at 07:51:11AM +0100, Anthony Campbell wrote: > > On 18 Sep 2001, Michael Heldebrant wrote: > > > On Tue, 2001-09-18 at 10:59, Anthony Campbell wrote: > > > > I have to have minicom setuid root, even though I have added myself to > > > >

Re: Minicom only works suid root

2001-09-19 Thread Anthony Campbell
On 19 Sep 2001, Carel Fellinger wrote: > On Wed, Sep 19, 2001 at 07:51:11AM +0100, Anthony Campbell wrote: > > On 18 Sep 2001, Michael Heldebrant wrote: > > > On Tue, 2001-09-18 at 10:59, Anthony Campbell wrote: > > > > I have to have minicom setuid root, even though I have added myself to > > > >

Re: Minicom only works suid root

2001-09-19 Thread Carel Fellinger
On Wed, Sep 19, 2001 at 07:51:11AM +0100, Anthony Campbell wrote: > On 18 Sep 2001, Michael Heldebrant wrote: > > On Tue, 2001-09-18 at 10:59, Anthony Campbell wrote: > > > I have to have minicom setuid root, even though I have added myself to > > > the dialout group, which according to the man pag

Re: Minicom only works suid root

2001-09-19 Thread Anthony Campbell
On 18 Sep 2001, Michael Heldebrant wrote: > On Tue, 2001-09-18 at 10:59, Anthony Campbell wrote: > > I have to have minicom setuid root, even though I have added myself to > > the dialout group, which according to the man page should allow access > > to serial port devices. Any suggestions for what

Re: SUID

2001-09-18 Thread Bambang Purnomosidi D. P.
On Wednesday 19 September 2001 12:27 am, Ian Marlier wrote: > I feel like an idiot asking this, but how does one set something to > run SUID? I can't figure out what change has to be made...I tried > RTFM, but didn't see anything that seemed relevant, even in the man > fil

Re: SUID

2001-09-18 Thread Nathan E Norman
On Wed, Sep 19, 2001 at 04:35:11AM +0800, csj wrote: > On Wed, 2001-09-19 at 03:15, Jason Healy wrote: > > At 1000834035s since epoch (09/18/01 13:27:15 -0400 UTC), Ian Marlier wrote: > > > I feel like an idiot asking this, but how does one set something to > > > run

Re: Minicom only works suid root

2001-09-18 Thread Michael Heldebrant
On Tue, 2001-09-18 at 10:59, Anthony Campbell wrote: > I have to have minicom setuid root, even though I have added myself to > the dialout group, which according to the man page should allow access > to serial port devices. Any suggestions for what's wrong? You need to add yourself to the dialout

Re: SUID

2001-09-18 Thread csj
On Wed, 2001-09-19 at 03:15, Jason Healy wrote: > At 1000834035s since epoch (09/18/01 13:27:15 -0400 UTC), Ian Marlier wrote: > > I feel like an idiot asking this, but how does one set something to > > run SUID? > > chmod u+s To setUID to the user that owns the file > ch

Re: SUID

2001-09-18 Thread Jason Healy
At 1000834035s since epoch (09/18/01 13:27:15 -0400 UTC), Ian Marlier wrote: > I feel like an idiot asking this, but how does one set something to > run SUID? chmod u+s To setUID to the user that owns the file chmod g+s To setGID to the group that owns the file Standard disclaimer: B

Re: SUID

2001-09-18 Thread Greg Wiley
On Tuesday, September 18, 2001 10:27 AM, [EMAIL PROTECTED] wrote: > I can't figure out what change has to be made...I tried > RTFM, but didn't see anything that seemed relevant Yeah, I'm not sure why,but neither 'man chmod' nor 'info chmod' answer th

SUID

2001-09-18 Thread Ian Marlier
I feel like an idiot asking this, but how does one set something to run SUID? I can't figure out what change has to be made...I tried RTFM, but didn't see anything that seemed relevant, even in the man files for sudoers and the like. - Ian -- [EMAIL PROTECTED] 773 667 9763 (hom

Minicom only works suid root

2001-09-18 Thread Anthony Campbell
I have to have minicom setuid root, even though I have added myself to the dialout group, which according to the man page should allow access to serial port devices. Any suggestions for what's wrong? Anthony -- Anthony Campbell - running Debian GNU/Linux (Windows-free zone). For electronic books

Re: Dosemu 1.0.2 and suid root

2001-08-04 Thread Anthony Campbell
On 04 Aug 2001, Matthias Fonfara wrote: > Since I installed Dosemu 1.0.2 it reports suid root is not allowed > because of insecure experimental code. I should recompile it without > this code. > > But I have no idea what to change. > > Bye > Matthias > - I had the s

Re: gpg: "Warning: using shared memory" - SUID?

2000-12-01 Thread Chris Gray
> Harry Henry Gebel writes: hhg> The mode is NOT seen as security enough. The private key is hhg> encrypted using a symmetrical cipher whose key is derived hhg> from a hash of the passphrase. (the exact cipher and hash can hhg> be specified in an S2K block in the secret keyring

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread Harry Henry Gebel
On Thu, Nov 30, 2000 at 09:03:57PM -0800, kmself@ix.netcom.com wrote: > on Thu, Nov 30, 2000 at 10:57:53PM -0500, Harry Henry Gebel ([EMAIL > PROTECTED]) wrote: > > On Thu, Nov 30, 2000 at 10:09:26PM -0500, Chris Gray wrote: > > > > "kmself" == kmself writes: > > > >> You're probably ri

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread Ethan Benson
On Thu, Nov 30, 2000 at 09:01:50PM -0800, kmself@ix.netcom.com wrote: > I did: > > gpg --armor --export-secret-keys kmself > > ...which did just that, without prompting for a passphrase. I think you > may be right about that. Hmmm Still, the key doesn't work without > the passphrase,

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread kmself
on Thu, Nov 30, 2000 at 10:57:53PM -0500, Harry Henry Gebel ([EMAIL PROTECTED]) wrote: > On Thu, Nov 30, 2000 at 10:09:26PM -0500, Chris Gray wrote: > > > "kmself" == kmself writes: > > >> You're probably right about this (IANA security expert), but > > >> these should only be reada

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread kmself
on Thu, Nov 30, 2000 at 10:09:26PM -0500, Chris Gray ([EMAIL PROTECTED]) wrote: > > "kmself" == kmself writes: > > >> You're probably right about this (IANA security expert), but > >> these should only be readable by root. Also, if you have a > >> malicious root, your private k

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread Harry Henry Gebel
On Thu, Nov 30, 2000 at 10:09:26PM -0500, Chris Gray wrote: > > "kmself" == kmself writes: > >> You're probably right about this (IANA security expert), but > >> these should only be readable by root. Also, if you have a > >> malicious root, your private key isn't going to be al

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread Chris Gray
> "kmself" == kmself writes: >> You're probably right about this (IANA security expert), but >> these should only be readable by root. Also, if you have a >> malicious root, your private key isn't going to be all that >> safe anyway. kmself> Well, on disk, your private

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread kmself
on Thu, Nov 30, 2000 at 07:09:02PM -0500, Chris Gray ([EMAIL PROTECTED]) wrote: > > "kmself" == kmself writes: > > >> The other root programs shouldn't be looking at memory other > >> than their own, or else they'd segfault. The major thing with > >> memory-locking is that the

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread Chris Gray
> "kmself" == kmself writes: >> The other root programs shouldn't be looking at memory other >> than their own, or else they'd segfault. The major thing with >> memory-locking is that the memory never gets written to disk. kmself> What about /proc/kcore or /dev/mem? You'r

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread kmself
on Thu, Nov 30, 2000 at 04:36:18PM -0500, Chris Gray ([EMAIL PROTECTED]) wrote: > >>>>> "kmself" == kmself writes: > > kmself> I'd also confirmed this on another box. Though I can > kmself> never remember what the [EMAIL PROTECTED]&*

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread Chris Gray
>>>>> "kmself" == kmself writes: kmself> I'd also confirmed this on another box. Though I can kmself> never remember what the [EMAIL PROTECTED]&*() mode bit is for SUID. kmself> '4577' was what I was looking for, IIRC. 4755.

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread kmself
o, but I'd just > get flamed Mutt 'L' is your friend . > > > It depends on how much you trust gnupg. Setting it SUID means that is > > > can lock pages sure. But it also means that it has to be really secure > > > - if you are running a single-user box t

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread Adam Langley
On Thu, Nov 30, 2000 at 12:05:58PM -0800, kmself@ix.netcom.com wrote: > Response redirected to list. > Follow-up set to list. Yea, sorry. I would suggest that the list set Reply-To, but I'd just get flamed > > It depends on how much you trust gnupg. Setting it SUID means tha

Re: gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread kmself
age from gpg > > since a system upgrade yesterday. Checking, I found that gpg was > > not set SUID. > > > > I've set the SUID bit, but am wondering why this changed. I can't > > find any notes about setting gnupg non-SUID in any of the obvious > > locati

gpg: "Warning: using shared memory" - SUID?

2000-11-30 Thread kmself
I'd been getting the "Warning: using shared memory" message from gpg since a system upgrade yesterday. Checking, I found that gpg was not set SUID. I've set the SUID bit, but am wondering why this changed. I can't find any notes about setting gnupg non-SUID in any of

Re: unreigster a suid file?

2000-09-25 Thread Ethan Benson
On Mon, Sep 25, 2000 at 01:11:19PM -0700, [EMAIL PROTECTED] wrote: > cron keeps telling me that some file from emacs is registered but not > installed, from the suidmanager, whats the best way to go about removing either use suidunregister (suidunregister /path/to/file) or just delete the relevant

Re: unreigster a suid fil

2000-09-25 Thread Jim McCloskey
|> cron keeps telling me that some file from emacs is registered but |> not installed, from the suidmanager, whats the best way to go about |> removing this entry(i recently removed emacs totally since i never |> use it) I know, this is really annoying. `Movemail' is it? s

unreigster a suid file?

2000-09-25 Thread [EMAIL PROTECTED]
cron keeps telling me that some file from emacs is registered but not installed, from the suidmanager, whats the best way to go about removing this entry(i recently removed emacs totally since i never use it) thanks! nate ::: http://www.aphroland.org/ http://www.linuxpowered.net/ [EMAIL PROTECTE

Re: Off Topic - SUID?

2000-09-23 Thread Pat Mahoney
On Sat, Sep 23, 2000 at 12:30:38AM -0500, William Jensen wrote: > What is SUID? RipperX complains it wants to be run as SUID? SUID is Set User I D. RipperX probably wants to SUID root? That means that if joe user runs RipperX, it will be as if root had run it. SUID is the cause of m

Off Topic - SUID?

2000-09-23 Thread William Jensen
What is SUID? RipperX complains it wants to be run as SUID? Wm

Re: suid root

2000-09-15 Thread Sven Burgener
On Thu, Sep 14, 2000 at 10:18:37PM -0400, Jonathan D. Proulx wrote: > If this machine is in your home *and* your internet connection is via > intermittent dial-up with dynamic IP adressing, I say no big deal. > If you have persistant internet connection (via LAN, xDSL, Cable) your > risk goes way

Re: suid root

2000-09-15 Thread Ben Collins
your self to the "floppy" group in /etc/group, then relogin. This will give you, and only you, permission to write to the floppy device. As for suid root, for "convenience", well, that's something we never do by default. We setup perms on devices like this (and programs th

Re: suid root

2000-09-15 Thread Michael Soulier
On Thu, 14 Sep 2000, Ethan Benson wrote: > a better way to go is adding yourself to group floppy, then you can > read and write /dev/fd0. this is less of a risk then making random > binaries suid. > > sudo as someone else mentioned is also probably safer. > > just

Re: suid root

2000-09-15 Thread Ethan Benson
On Thu, Sep 14, 2000 at 10:00:55PM -0400, Michael Soulier wrote: > > How do you guys feel about SUID root? For example, I'm here using > supermount, finding it mildly annoying that I have to login as root to > format a floppy. Is it against the "Debian way" to SU

Re: suid root

2000-09-14 Thread Jonathan D. Proulx
On Thu, Sep 14, 2000 at 10:00:55PM -0400, Michael Soulier wrote: : : How do you guys feel about SUID root? For example, I'm here using :supermount, finding it mildly annoying that I have to login as root to :format a floppy. Is it against the "Debian way" to SUID root on

suid root

2000-09-14 Thread Michael Soulier
How do you guys feel about SUID root? For example, I'm here using supermount, finding it mildly annoying that I have to login as root to format a floppy. Is it against the "Debian way" to SUID root on supermount and mformat for convenience? Does that cause a majo

  1   2   >