Unfortunately using the '-b' flag does nothing at all. I would expect to be able to do:
And all ACL's would be removed back to regular permissions, but this isn't the case. Neither command removes ACL's. As I mentioned, I thought it might be that they were just getting inherited from up the directory tree but there are no ACL's up the tree.
Any thoughts on what might be causing the '-b' and '-k' to do nothing to the ACL's? Possibly an issue with a mask?
Hi all,
I've just been handled the responsibility for a FTP-site. Having no experiens of UNIX at all. And now one of my users needs to have full access to the usr directory and all it's subdirectories, don't know why just trying to do what the boss tells me. The type of UNIX is FreeBSD and the... (4 Replies)
Hello genius..!
what do y'all think of these questions...? help appreciated...!
Access Control Lists and privileges....
# Why both file ACLs and user permissions/privileges (not to be confused with rights in ACLs) are used in Windows access control (why not just use one of these)?
# In... (1 Reply)
Hi,
I generated a script that will create the list of dir/sub-dir and will allow to create the same on diff server. this is what i have done :
#!/bin/ksh
# Script to migrate the directory between the two servers.
# Ver 0.1
# Author Krishna. D
# c - create and e - extract directory
if ;... (1 Reply)
Hi, I want to know what does the "effective" comment means in the output of the getfacl and whether it has to do with the acl mask...
thanks (0 Replies)
Hello,
I try to find what year HP-UX got support for ACL (Access Control List)? I know that HP-UX was the first Unix with ACL support, but it is very hard to find the information on when that occured.
So anyone here know when that did happen?
Any answers are appreciated,
/eXpander (1 Reply)
Hi Friends,
I went through the ACL threads that were posted in the past but none were matching to my requirement . Hence starting a new thread .
Challenge :
user : a
group : Test1
user: b
group: Test2
Say under user a i create dir /tmp/debug with the privilege of 755 and also... (3 Replies)
Discussion started by: leobreaker
3 Replies
LEARN ABOUT OPENSOLARIS
acl_check
acl_check(3SEC) File Access Control Library Functions acl_check(3SEC)NAME
acl_check - check the validity of an ACL
SYNOPSIS
cc [ flag... ] file... -lsec [ library... ]
#include <sys/acl.h>
int acl_check(acl_t *aclp, int isdir);
DESCRIPTION
The acl_check() function checks the validity of an ACL pointed to by aclp. The isdir argument checks the validity of an ACL that will be
applied to a directory. The ACL can be either a POSIX draft ACL as supported by UFS or NFSv4 ACL as supported by ZFS or NFSV4.
When the function verifies a POSIX draft ACL, the rules followed are described in aclcheck(3SEC). For NFSv4 ACL, the ACL is verified
against the following rules:
o The inheritance flags are valid.
o The ACL must have at least one ACL entry and no more than {MAX_ACL_ENTRIES}.
o The permission field contains only supported permissions.
o The entry type is valid.
o The flag fields contain only valid flags as supported by NFSv4/ZFS.
If any of the above rules are violated, the function fails with errno set to EINVAL.
RETURN VALUES
If the ACL is valid, acl_check() returns 0. Otherwise errno is set to EINVAL and the return value is set to one of the following:
EACL_INHERIT_ERROR There are invalid inheritance flags specified.
EACL_FLAGS_ERROR There are invalid flags specified on the ACL that don't map to supported flags in NFSV4/ZFS ACL model.
EACL_ENTRY_ERROR The ACL contains an unknown value in the type field.
EACL_MEM_ERROR The system cannot allocate any memory.
EACL_INHERIT_NOTDIR Inheritance flags are only allowed for ACLs on directories.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Committed |
+-----------------------------+-----------------------------+
|MT-Level |MT-Safe |
+-----------------------------+-----------------------------+
SEE ALSO acl(2), aclcheck(3SEC), aclsort(3SEC), acl(5), attributes(5)SunOS 5.11 22 Apr 2008 acl_check(3SEC)