04-01-2005
setuid doesn't usually work with scripts it's a security feature, if you check you will find that the script does not run as root.
You will need a biary wrapper to allow you to do that, or possibly you could do it with Perl.
Last edited by reborg; 04-01-2005 at 08:07 PM..
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
I have a C wrapper programme which basically execute a shell script. The shell script has 700 as permission and oracle is owner of the shell script.
The C execuatble has 4711 permission so that means that it has setuid bit set and group and others can execute the C executable.
The reason why I am... (2 Replies)
Discussion started by: sanjay92
2 Replies
2. UNIX for Advanced & Expert Users
Hi,
I have a program with the following suid setup
-rwsr-sr-x 1 root other 653 Aug 16 17:00 restart_server
It basically starts up a service that has to be started by root. I just want the normal users to be able to restart the service using the script above.
But when the... (7 Replies)
Discussion started by: 0ktalmagik
7 Replies
3. UNIX for Dummies Questions & Answers
could u plz give me clear idea of spcial permissions setuid,getuid and striky bit . (1 Reply)
Discussion started by: Prem
1 Replies
4. UNIX for Dummies Questions & Answers
Hi
I executed command "chown -R xxx:xxx /" with user root... and it was too late when I found the mistake. Ownership of some files under the root directory had already become xxx:xxx. Is there a way that can recovery the ownership of all my files back to the point where they were? I really thanks. (2 Replies)
Discussion started by: password636
2 Replies
5. AIX
Guy's
I'm trying to add some lines in sudo by useing this command visudo
# User privilege specification
root ALL=(ALL) ALL
# Uncomment to allow people in group wheel to run all commands
# %wheel ALL=(ALL) ALL
# Same thing without a password
# %wheel ALL=(ALL) NOPASSWD: ALL
#... (5 Replies)
Discussion started by: ITHelper
5 Replies
6. UNIX for Dummies Questions & Answers
Hi Expert,
I am trying to change ownership of one file to another user that is exist in the system but getting operation not permitted error
what could be the correct way?
# ls -lh .Xauthority_ori
-rw------- 1 maxim atlas 2.8K Jul 27 17:18 .Xauthority_ori
# id -a
uid=0(root)... (8 Replies)
Discussion started by: regmaster
8 Replies
7. Solaris
Hi Gurus,
I need your suggestions,to implement setuid.
Here is the situation. I have a user xyz on a solaris zone.He needs to install a package using a pkgadd command but i guess only a root can run that .Is there any way I can set the setuid bit on the pkgadd which is in the location... (6 Replies)
Discussion started by: rama krishna
6 Replies
8. Solaris
Hi All
After downloading ZFS documentation from oracle site, I am able to successfully migrate UFS root FS without zones to ZFS root FS. But in case of UFS root file system with zones , I am successfully able to migrate global zone to zfs root file system but zone are still in UFS root file... (2 Replies)
Discussion started by: sb200
2 Replies
9. Red Hat
RHEL 6.3
Could someone tell me how to use the find and chown command to replace all files in a directory owned by user1 (for this example) and replace with user1:group1? Most importantly I dont want to change any files owned by root. I recently used the following command but it changed the root... (4 Replies)
Discussion started by: gps1976
4 Replies
10. UNIX for Beginners Questions & Answers
Just learning about the privilege escalation method provided by setuid. Correct me if I am wrong but what it does is change the uid of the current process to whatever uid I set. Right ?
So what stops me from writing my own C program and calling setuid(0) within it and gaining root privileges ?
... (2 Replies)
Discussion started by: sreyan32
2 Replies
LEARN ABOUT DEBIAN
checksecurity
CHECKSECURITY(8) System Manager's Manual CHECKSECURITY(8)
NAME
checksecurity - Run a collection of simple system checks
SYNOPSIS
checksecurity
DESCRIPTION
The checksecurity command runs a small collection of simple system checks which are designed to catch a few common security issues. check-
security is run by cron in a daily basis.
CONFIGURATION
The checksecurity.conf file defines several configuration variables: MAILTO, CHECK_DISKFREE, CHECK_PASSWD and CHECK_SETUID LOGDIR. Each is
described below.
The checksecurity program works with a collection of plugins which are located in /usr/share/checksecurity and are configured individually
by their own configuration file.
CHECK_PASSWD If this is set to TRUE then the check-passwd script will be invoked. This script is designed to report upon system accounts
which have no passwords. CHECK_DISKFREE If this is set to TRUE then the check-diskfree script will be invoked and will allow an alert to
be sent if there is any mounted partition is running short on disk space. CHECK_SETUID If this is set to TRUE then the check-setuid script
will be invoked, this will compare the setuid binaries upon the system to those that existed previously and show the differences.
FILES
/etc/checksecurity.conf
checksecurity configuration file
SEE-ALSO
See also check-diskfree(8), check-setuid(8), and check-passwd(8)
Debian Linux 2 February 1997 CHECKSECURITY(8)