11-18-2010
Without knowing what apps are on your systems, I would hazard a guess: Yes, it will break a lot things. In general do not change permissions on objects in /usr/bin on the advice of a website somewhere. They are part of the system and the designers want them to be as they are. Not as an academic type at Stanford wants thewm to be in his little shop of horrors.
For example:
Everybody expects their scripts to be able to run ping. Because it uses a restricted TCP port number it requires setuid.
Disabling kerberos will break some networking apps.
As a counterexample
consider the at.deny, at.allow, cron.deny, cron.allow, /etc/sudoers files to control access to at, crontab, and sudo. Rather than changing permissions on system files.
Don't remove the setuid permissions.
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have a C wrapper programme which basically execute a shell script. The shell script has 700 as permission and oracle is owner of the shell script.
The C execuatble has 4711 permission so that means that it has setuid bit set and group and others can execute the C executable.
The reason why I am... (2 Replies)
Discussion started by: sanjay92
2 Replies
2. UNIX for Dummies Questions & Answers
I have a file containing social security numbers with the format ###-##-####. I need to read each record in this file, reformat the SSN to the format #########, and write the record with the reformatted SSN to a new file. I am a UNIX newbie. I think I need to use either the sed or awk commands, but... (2 Replies)
Discussion started by: Marcia P
2 Replies
3. UNIX for Dummies Questions & Answers
could u plz give me clear idea of spcial permissions setuid,getuid and striky bit . (1 Reply)
Discussion started by: Prem
1 Replies
4. UNIX for Dummies Questions & Answers
In Solaris 9, when I built users, there was an option for No Password -- Setuid Only. Now that I'm using Solaris 10, I no longer can find that option.
Is there an equivalent option of No Password --Setuid Only in Solaris 10?
Thanks,
LeonD (1 Reply)
Discussion started by: leond
1 Replies
5. Shell Programming and Scripting
Hi all,
I am parsing command line options using getopts.
The problem is that mandatory argument options following ":" is taking next option as argument if it is not followed by any argument.
Below is the script:
while getopts :hd:t:s:l:p:f: opt
do
case "$opt" in
-h|-\?)... (2 Replies)
Discussion started by: gurukottur
2 Replies
6. Solaris
Hey all, I need to remove the ro option from an fs on a zone. Does anyone know how to do this without removing the fs and recreating it?
fs:
dir: /home/em23/prod
special: /export/zones/em23/root/ftp/prod
raw not specified
type: lofs
options: (1 Reply)
Discussion started by: em23
1 Replies
7. Solaris
Hi All,
Can someone give me some info about setuid or guid topic? Also about sticky bit.
Thanks in advance,
itik (9 Replies)
Discussion started by: itik
9 Replies
8. Shell Programming and Scripting
To find all the files in your home directory that have been edited in some way since the last tar file, use this command:
find . -newer backup.tar.gz
Is anyone familiar with an older solution?
looking to identify files older then 15mins across several directories.
thanks,
manny (2 Replies)
Discussion started by: mr_manny
2 Replies
9. Solaris
Hi Gurus,
I need your suggestions,to implement setuid.
Here is the situation. I have a user xyz on a solaris zone.He needs to install a package using a pkgadd command but i guess only a root can run that .Is there any way I can set the setuid bit on the pkgadd which is in the location... (6 Replies)
Discussion started by: rama krishna
6 Replies
10. UNIX for Beginners Questions & Answers
Just learning about the privilege escalation method provided by setuid. Correct me if I am wrong but what it does is change the uid of the current process to whatever uid I set. Right ?
So what stops me from writing my own C program and calling setuid(0) within it and gaining root privileges ?
... (2 Replies)
Discussion started by: sreyan32
2 Replies
LEARN ABOUT DEBIAN
checksecurity
CHECKSECURITY(8) System Manager's Manual CHECKSECURITY(8)
NAME
checksecurity - Run a collection of simple system checks
SYNOPSIS
checksecurity
DESCRIPTION
The checksecurity command runs a small collection of simple system checks which are designed to catch a few common security issues. check-
security is run by cron in a daily basis.
CONFIGURATION
The checksecurity.conf file defines several configuration variables: MAILTO, CHECK_DISKFREE, CHECK_PASSWD and CHECK_SETUID LOGDIR. Each is
described below.
The checksecurity program works with a collection of plugins which are located in /usr/share/checksecurity and are configured individually
by their own configuration file.
CHECK_PASSWD If this is set to TRUE then the check-passwd script will be invoked. This script is designed to report upon system accounts
which have no passwords. CHECK_DISKFREE If this is set to TRUE then the check-diskfree script will be invoked and will allow an alert to
be sent if there is any mounted partition is running short on disk space. CHECK_SETUID If this is set to TRUE then the check-setuid script
will be invoked, this will compare the setuid binaries upon the system to those that existed previously and show the differences.
FILES
/etc/checksecurity.conf
checksecurity configuration file
SEE-ALSO
See also check-diskfree(8), check-setuid(8), and check-passwd(8)
Debian Linux 2 February 1997 CHECKSECURITY(8)