Sponsored Content
Top Forums Shell Programming and Scripting Setuid and setgid and similar settings Post 302992175 by Corona688 on Wednesday 22nd of February 2017 10:03:23 AM
Old 02-22-2017
I have the opposite problem - to accommodate the format's lack of permissions handling, when I extract a zip, it usually turns everything executable, just in case. This is because ZIP files, originating in MS-DOS, cannot encode executable bits... or permissions... or owners... Or really anything.

Use TAR if you expect permissions to be respected.
This User Gave Thanks to Corona688 For This Post:
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

setuid

I have a C wrapper programme which basically execute a shell script. The shell script has 700 as permission and oracle is owner of the shell script. The C execuatble has 4711 permission so that means that it has setuid bit set and group and others can execute the C executable. The reason why I am... (2 Replies)
Discussion started by: sanjay92
2 Replies

2. UNIX for Dummies Questions & Answers

Using setuid and setgid

Hi, I have been looking at setuid and setgid. I understand that setuid determines who owns the file and setgid determines which group of people can access the file... yeah?! But i need to know how to actually use setuid and setgid. I'm guessing chmod will feature somewhere.. Any help... (1 Reply)
Discussion started by: crispy
1 Replies

3. Programming

setgid

I have a setuid to root program that has now to be changed to setuid to oracle depending on who is running it. Oracle has only two groups, dba (primary) and osgrp1 (secondary). But running 'id' if oracle shows all the secondary groups belonging to root, and only dba or osgrp1 as the primary group... (2 Replies)
Discussion started by: blowtorch
2 Replies

4. Shell Programming and Scripting

Searching for SETUID and SETGID using PERL file find with lstat

About System and Perl: Sun Solaris 5.9 sparc, Perl 5.6.1 I've decided to use the perl file::find module to look for all the SETUID and SETGID files on my unix boxes. I wrote something like this: (I've shorted it a little to make it simple) #!/opt/perl/bin/perl use File::Find; find... (1 Reply)
Discussion started by: x96riley3
1 Replies

5. UNIX for Dummies Questions & Answers

setuid

could u plz give me clear idea of spcial permissions setuid,getuid and striky bit . (1 Reply)
Discussion started by: Prem
1 Replies

6. Solaris

about setuid setgid permissions

hi.. why we go for setuid, setgid permissions? as a system admin ,when we use this ,except default solaris setuid,setgid files and dirs.. hopes that anyone can help me regarding this.. (1 Reply)
Discussion started by: saravananpalani
1 Replies

7. UNIX for Dummies Questions & Answers

A little doubt regarding setgid and Unix access right flags.

Hi all! I have a folder with permissions 2770 (SETGID) drwxrws--- 2 loguser admins 5 Mar 17 11:11 mydir Inside that folder there are some files with permissions 0640: -rw-r----- 1 loguser admins 0 Mar 17 11:11 monday.log -rw-r----- 1 loguser admins ... (2 Replies)
Discussion started by: verdepollo
2 Replies

8. UNIX for Dummies Questions & Answers

How can I re-enable the setuid or setgid bits ???

While I was looking for tips for hardening the security of my MAC OSX I found the following posting: "<How to disable Setuid and Setgid Binaries > Setuid programs run with the privileges of the file's owner (which is often root), no matter which user executes them. Bugs in these programs... (6 Replies)
Discussion started by: Vera
6 Replies

9. Solaris

Special File Permissions Setgid and setuid ..HELP

I have a user AAA who's who is part of a group call clserv and techsupp, His userfiles have the following permissions:- drwxrwx--- 16 AAA clserv 1858 Aug 22 12:48 UserFiles he has a link in his UserFiles/ lrwxrwxrwx 1 root root 36 Mar 9 2013 TECHSUPP_GLOBAL... (5 Replies)
Discussion started by: kilobyter
5 Replies

10. UNIX for Beginners Questions & Answers

What keeps me from abusing setuid(0) and programs with setuid bit set?

Just learning about the privilege escalation method provided by setuid. Correct me if I am wrong but what it does is change the uid of the current process to whatever uid I set. Right ? So what stops me from writing my own C program and calling setuid(0) within it and gaining root privileges ? ... (2 Replies)
Discussion started by: sreyan32
2 Replies
STRMODE(3)						   BSD Library Functions Manual 						STRMODE(3)

NAME
strmode -- convert inode status information into a symbolic string LIBRARY
Utility functions from BSD systems (libbsd, -lbsd) SYNOPSIS
#include <bsd/string.h> void strmode(mode_t mode, char *bp); DESCRIPTION
The strmode() function converts a file mode (the type and permission information associated with an inode, see stat(2)) into a symbolic string which is stored in the location referenced by bp. This stored string is eleven characters in length plus a trailing NUL. The first character is the inode type, and will be one of the following: - regular file b block special c character special d directory l symbolic link p fifo s socket w whiteout ? unknown inode type The next nine characters encode three sets of permissions, in three characters each. The first three characters are the permissions for the owner of the file, the second three for the group the file belongs to, and the third for the ``other'', or default, set of users. Permission checking is done as specifically as possible. If read permission is denied to the owner of a file in the first set of permis- sions, the owner of the file will not be able to read the file. This is true even if the owner is in the file's group and the group permis- sions allow reading or the ``other'' permissions allow reading. If the first character of the three character set is an ``r'', the file is readable for that set of users; if a dash ``-'', it is not read- able. If the second character of the three character set is a ``w'', the file is writable for that set of users; if a dash ``-'', it is not writable. The third character is the first of the following characters that apply: S If the character is part of the owner permissions and the file is not executable or the directory is not searchable by the owner, and the set-user-id bit is set. S If the character is part of the group permissions and the file is not executable or the directory is not searchable by the group, and the set-group-id bit is set. T If the character is part of the other permissions and the file is not executable or the directory is not searchable by others, and the ``sticky'' (S_ISVTX) bit is set. s If the character is part of the owner permissions and the file is executable or the directory searchable by the owner, and the set- user-id bit is set. s If the character is part of the group permissions and the file is executable or the directory searchable by the group, and the set- group-id bit is set. t If the character is part of the other permissions and the file is executable or the directory searchable by others, and the ``sticky'' (S_ISVTX) bit is set. x The file is executable or the directory is searchable. - None of the above apply. The last character is a plus sign ``+'' if any there are any alternate or additional access control methods associated with the inode, other- wise it will be a space. SEE ALSO
chmod(1), find(1), stat(2), getmode(3), setmode(3) HISTORY
The strmode() function first appeared in 4.4BSD. BSD
July 28, 1994 BSD
All times are GMT -4. The time now is 12:59 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy