08-03-2010
I'm not sure if the suid bit is the best way to go, because the next update-rpm might change the access rights back to the Redhat default which seems to be not suid.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have just found out that a project I have developed in ASP (ultradev) needs to be migrated to a unix server and won't be able to support asp. Can anyone point me in the right direction to see what my options are with Unix? I have never worked with or developed for a Unix box before.
Also,... (3 Replies)
Discussion started by: Ricki
3 Replies
2. UNIX for Advanced & Expert Users
Hi,
I need to develop timeout functionality in my code, which is not affected by system's time changes.Unfortunately I dont have CLOCK_MONOTONIC support in my OS.
Are there any alternatives? (3 Replies)
Discussion started by: amitks21
3 Replies
3. Linux
Hi folks,
Any folk has experience on ntop/Nmon
ntop - network top
and its spinoff NMON
Welcome to nmon.net
Nmon
Nmon - Wikipedia, the free encyclopedia
nmon for AIX and Linux Performance Monitoring
IBM Wikis - AIX 5L Wiki - nmon
A free tool to analyze AIX and Linux... (5 Replies)
Discussion started by: satimis
5 Replies
4. Shell Programming and Scripting
Hi,
I am using rsync to copy files and links from one server to other (backup server).
The problem with rsync is that it is not copying the files and links in the order which i have mentioned.
It is sorting in alphabetical order before it is copying the files and links.
I want a utilty that... (1 Reply)
Discussion started by: vvenu88
1 Replies
5. Shell Programming and Scripting
I am writing a BASH script to update a webserver and then restart Apache. It looks basically like this:
#!/bin/bash
rsync /path/on/local/machine/ foo.com:path/on/remote/machine/
ssh foo.com sudo /etc/init.d/apache2 reloadrsync and ssh don't prompt for a password, because I have DSA encryption... (9 Replies)
Discussion started by: fluoborate
9 Replies
6. Shell Programming and Scripting
I have a list of items (control file) that I want to substitute in a text file, and it's BIG.
The file has two items, the original, and the new:
A B
B C
D E
The file has something like 10,000 entries.
So in the oldfile.txt, I'd like to basically make all these expression matched... (9 Replies)
Discussion started by: twoblink
9 Replies
7. UNIX for Advanced & Expert Users
Hi,
I am using SSH to execute unix commands on remote machines. But, SSH will be diabled soon and I am looking for other alternatives to execute remote scripts/commands, without SSH . any suggestions or workarounds with out SSH for remote program executions ?
Thanks in advance. (4 Replies)
Discussion started by: talashil
4 Replies
8. Shell Programming and Scripting
Are there any other alternatives to using Expect script? Can functionality provided by Expect be achieved by any other scripting language? (7 Replies)
Discussion started by: indianya
7 Replies
9. UNIX for Dummies Questions & Answers
Hi is there an alternative other than the find command to get the size of files which are 10 days older ? I already use a script with find command
find . -mtime +10.
However would want to have an alternative script to find the size of files which are over 10 days.
Let me know if you... (1 Reply)
Discussion started by: venkidhadha
1 Replies
10. Shell Programming and Scripting
I'm adapting a BASH script to run with an absolute minimal amounts of Cygwin64 files so colleagues using Windows can use it without installing Cygwin.
I am down to the following in /bin only (replacing cut with parameter substitution eliminated all needed things in /etc)
bash.exe
cygattr-1.dll... (5 Replies)
Discussion started by: Michael Stora
5 Replies
setuid(2) System Calls Manual setuid(2)
NAME
setuid(), setgid() - set user and group IDs
SYNOPSIS
DESCRIPTION
sets the real-user-ID (ruid), effective-user-ID (euid), and/or saved-user-ID (suid) of the calling process. If the Security Containment
product is installed, these interfaces treat a process observing as a privileged process. Otherwise, only processes with an euid of zero
are treated as privileged processes. See privileges(5) for more information on Security Containment and fine-grained privileges.
The following conditions govern setuid's behavior:
o If the process is privileged, sets the ruid, euid, and suid to uid.
o If the process is not privileged and the argument uid is equal to the ruid or the suid, sets the euid to uid; the ruid and suid
remain unchanged. (If a set-user-ID program is not running as superuser, it can change its euid to match its ruid and reset
itself to the previous euid value.)
o If the process is not privileged, the argument uid is equal to the euid, and the calling process has the privilege, sets the ruid
to uid; the euid and suid remain unchanged.
sets the real-group-ID (rgid), effective-group-ID (egid), and/or saved-group-ID (sgid) of the calling process. The following conditions
govern behavior:
o If the process is privileged, sets the rgid and egid to gid.
o If the process is not privileged and the argument gid is equal to the rgid or the sgid, sets the egid to gid; the rgid and sgid
remain unchanged.
o If the process is not privileged, the argument gid is equal to the egid, and the calling process has the privilege, sets the rgid
to gid; the egid and sgid remain unchanged.
Security Restrictions
Some or all of the actions associated with this system call require the privilege. Processes owned by the superuser have this privilege.
Processes owned by other users may have this privilege, depending on system configuration.
See privileges(5) for more information about privileged access on systems that support fine-grained privileges.
RETURN VALUE
Upon successful completion, and return 0; otherwise, they return -1 and set to indicate the error.
ERRORS
and fail and return -1 if any of the following conditions are encountered:
None of the conditions above are met.
uid (gid) is not a valid user (group) ID.
WARNINGS
It is recommended that the capability be avoided, as it is provided for backward compatibility. This feature may be modified or dropped
from future HP-UX releases. When changing the real user ID and real group ID, use of and (see setresuid(2)) is recommended instead.
AUTHOR
was developed by AT&T, the University of California, Berkeley, and HP.
was developed by AT&T.
SEE ALSO
exec(2), getuid(2), setresuid(2), privileges(5).
STANDARDS CONFORMANCE
setuid(2)