07-11-2005
CHMOD Question
I've always been fascinated by permissions and I have a question. Since the shell isn't a "virtual environment" (like say a web forum, where permissions can be enforced with absolute confidence), what's actually keeping an unauthorized user from viewing a CHMODed file? The read/write routines? Why not just rewrite them, unless they're CHMODed too. But it wouldn't make sense to protect the protector... please enlighten me
![Smilie Smilie](https://www.unix.com/images/smilies/smile.gif)
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Ok, listen.........I was using FTP Works to remove and add some files to a domain server. I messed with chmod button and made it so that no-one could access or their browsers could execute files and 2 or three certain directories. If anyone knows how to use this command and will give me a heads up... (2 Replies)
Discussion started by: jarrell
2 Replies
2. UNIX for Dummies Questions & Answers
Here is the deal, I am good with html and java and am creating a website for my brother. On this site he has chosen to use a ikonboard.com discussion board. I have done everything I can to pull it off, but no can do. Here is the problem:
The site is being created using the angelfire... (12 Replies)
Discussion started by: xwfprez
12 Replies
3. UNIX for Dummies Questions & Answers
Hi,
can anybody help me?
i have probable a simple problem about permissions.
i have a server and on this server there comes some files from a another server via ftp with a separte user.
i would like to modify the files with a awk script but i donīt have the permissions to modify the... (3 Replies)
Discussion started by: scotty
3 Replies
4. UNIX for Dummies Questions & Answers
Hello,
If I am an user on a Solaris 9 system and if I do Chmod 000 on the folder corresponding to my workspace...
What will happened??? (1 Reply)
Discussion started by: Erythro73
1 Replies
5. UNIX for Dummies Questions & Answers
Hey everyone, I was wondering if there was a quicker way to chmod a lot of files than doing what im currently doing.
At the moment, im doing chmod 777 *filename* - but I have a lot of files, sub-directories, sub-files etc etc. And at the moment I see I have to chmod every single file... (3 Replies)
Discussion started by: mo0ness
3 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I am newbie in unix.
I have folder/file own by groupA, how to make that folder/file can write/read for groupB and read only for groupC, and others groups cannot read/write.
Can you help me?
Thank you. (4 Replies)
Discussion started by: blesets
4 Replies
7. UNIX for Advanced & Expert Users
I have two files,like follows:
$ls -l foo bar
-rw------- bar
-rw-rw-rw- foo
Then I execute follow code:
chmod("foo",(statbuf.st_mode & ~S_IXGRP) | S_ISGID)
chmod("bar",S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH)
Then I view the result
$ls -l foo bar
-rw-r--r-- bar... (1 Reply)
Discussion started by: konvalo
1 Replies
8. UNIX and Linux Applications
i think it is the same in both... Iam i right? (1 Reply)
Discussion started by: sumaiya
1 Replies
9. UNIX for Dummies Questions & Answers
Hi I tried to use chmod in unix to change my file's permission.
chmod 701 hello.cgi
And it did change my desired file's permission. Yet, the name of the file is changed to hello.cgi* . And therefore I cannot compile it after that. So, I just wondering why there is an extra '*' in the file's... (2 Replies)
Discussion started by: alvin8906
2 Replies
10. UNIX for Dummies Questions & Answers
I have a folder called "test" and this folder contains lots of other folders as sub folders, i intend to search for all file ending with .bin and then change the files to executable please how do i do this
---------- Post updated at 10:48 AM ---------- Previous update was at 10:42 AM ----------... (3 Replies)
Discussion started by: oyesiji
3 Replies
LEARN ABOUT SUNOS
restricted_shell
rsh(1M) System Administration Commands rsh(1M)
NAME
rsh, restricted_shell - restricted shell command interpreter
SYNOPSIS
/usr/lib/rsh [-acefhiknprstuvx] [argument...]
DESCRIPTION
rsh is a limiting version of the standard command interpreter sh, used to restrict logins to execution environments whose capabilities are
more controlled than those of sh (see sh(1) for complete description and usage).
When the shell is invoked, it scans the environment for the value of the environmental variable, SHELL. If it is found and rsh is the file
name part of its value, the shell becomes a restricted shell.
The actions of rsh are identical to those of sh, except that the following are disallowed:
o changing directory (see cd(1)),
o setting the value of $PATH,
o pecifying path or command names containing /,
o redirecting output (> and >>).
The restrictions above are enforced after .profile is interpreted.
A restricted shell can be invoked in one of the following ways:
1. rsh is the file name part of the last entry in the /etc/passwd file (see passwd(4));
2. the environment variable SHELL exists and rsh is the file name part of its value; the environment variable SHELL needs to be set in the
.login file;
3. the shell is invoked and rsh is the file name part of argument 0;
4. the shell is invoke with the -r option.
When a command to be executed is found to be a shell procedure, rsh invokes sh to execute it. Thus, it is possible to provide to the end-
user shell procedures that have access to the full power of the standard shell, while imposing a limited menu of commands; this scheme
assumes that the end-user does not have write and execute permissions in the same directory.
The net effect of these rules is that the writer of the .profile (see profile(4)) has complete control over user actions by performing
guaranteed setup actions and leaving the user in an appropriate directory (probably not the login directory).
The system administrator often sets up a directory of commands (that is, /usr/rbin) that can be safely invoked by a restricted shell. Some
systems also provide a restricted editor, red.
EXIT STATUS
Errors detected by the shell, such as syntax errors, cause the shell to return a non-zero exit status. If the shell is being used non-
interactively execution of the shell file is abandoned. Otherwise, the shell returns the exit status of the last command executed.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
intro(1), cd(1), login(1), rsh(1), sh(1), exec(2), passwd(4), profile(4), attributes(5)
NOTES
The restricted shell, /usr/lib/rsh, should not be confused with the remote shell, /usr/bin/rsh, which is documented in rsh(1).
SunOS 5.10 1 Nov 1993 rsh(1M)