Sponsored Content
Full Discussion: Stunnel as non root !!
Top Forums UNIX for Advanced & Expert Users Stunnel as non root !! Post 302825515 by DGPickett on Monday 24th of June 2013 01:54:17 PM
Old 06-24-2013
Well, you need to stunnel only on high ports. Some daemons may not want to run as you id, being designed for root. What services are you seeking to stunnel?
 

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Run non-root script as root with non-root environment

All, I want to run a non-root script as the root user with non-root environment variables with crontab. The non-root user would have environment variables for database access such as Oracle or Sybase. The root user does not have the Oracle or Sybase enviroment variables. I thought you could do... (2 Replies)
Discussion started by: bubba112557
2 Replies

2. UNIX for Advanced & Expert Users

stunnel will not start

am tring to start stunnel version 4.05 that come standard with Suse Enterprise 9 CD. I intend to start stunnel as a daemon, I have generate and self signed the certificate using openssl with openssl version 0.9.7d but stunnel will not start up instead I received the following error message ... (1 Reply)
Discussion started by: hassan1
1 Replies

3. SCO

Starting up stunnel on SCO Openserver 5.0.7

Hi there I have compiled a binary of stunnel for SCO Openserver 5.0.7 At the moment the binary is in /u/testroom/sbin/stunnel as root I cd to /u/testroom/sbin and start the stunnel daemon up with ./stunnel The stunnel log shows when users successfully connect or disconnect, so... (1 Reply)
Discussion started by: The_Librarian
1 Replies

4. UNIX for Advanced & Expert Users

Help with Getting Stunnel Running

OS: Sun Solaris 10 (5.10) Stunnel has been installed but when I try to run it, I get a directory permission error. Not sure what it means by 'Not owner' even though that's plain English. I have changed the chroot to a directory (var/tmp) that I'm sure all users have access to so not sure... (0 Replies)
Discussion started by: neapolitan
0 Replies

5. UNIX and Linux Applications

Update CRL in stunnel?

Hi, Does anyone know if there is a way to update CRLs in stunnel, without restarting stunnel? If I copy a new CRL to my CRLPath, it is only used for services (from config file) that hasn't been used yet. Services that has been used at least once does not care about new CRLs... (0 Replies)
Discussion started by: pelig
0 Replies

6. Solaris

Migration of system having UFS root FS with zones root to ZFS root FS

Hi All After downloading ZFS documentation from oracle site, I am able to successfully migrate UFS root FS without zones to ZFS root FS. But in case of UFS root file system with zones , I am successfully able to migrate global zone to zfs root file system but zone are still in UFS root file... (2 Replies)
Discussion started by: sb200
2 Replies
SETUID(1)						      General Commands Manual							 SETUID(1)

NAME
setuid - run a command with a different uid. SYNOPSIS
setuid username|uid command [ args ] DESCRIPTION
Setuid changes user id, then executes the specified command. Unlike some versions of su(1), this program doesn't ever ask for a password when executed with effective uid=root. This program doesn't change the environment; it only changes the uid and then uses execvp() to find the command in the path, and execute it. (If the command is a script, execvp() passes the command name to /bin/sh for processing.) For example, setuid some_user $SHELL can be used to start a shell running as another user. Setuid is useful inside scripts that are being run by a setuid-root user -- such as a script invoked with super, so that the script can execute some commands using the uid of the original user, instead of root. This allows unsafe commands (such as editors and pagers) to be used in a non-root mode inside a super script. For example, an operator with permission to modify a certain protected_file could use a super command that simply does: cp protected_file temp_file setuid $ORIG_USER ${EDITOR:-/bin/vi} temp_file cp temp_file protected_file (Note: don't use this example directly. If the temp_file can somehow be replaced by another user, as might be the case if it's kept in a temporary directory, there will be a race condition in the time between editing the temporary file and copying it back to the protected file.) AUTHOR
Will Deich local SETUID(1)
All times are GMT -4. The time now is 03:02 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy