8 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I am trying to add a static route in one of 3 server (S3) so that I can access the main application server (S1). But problem is, the server (S3) where I am trying to add static route is connected with another server (S2) which is in same private network of application server (S1).
I have... (9 Replies)
Discussion started by: ImranBD
9 Replies
2. Linux
Hi
I'm trying to upload my website via FTP FileZilla with 123-reg on a Linux package. I built my site using iWeb which tells me that it's ok to publish to FTP which I do and it downloads the directories ok. It connects then stops saying econnreset by peer.
I've no idea what this means and I... (3 Replies)
Discussion started by: Emma heptonstal
3 Replies
3. IP Networking
I am looking for advice on a router. I am new to Linux and am trying to use Limewire and Ktorent and can make no connection. Limewire indicates I have a firewall. I have a Linksys router WRK54G and my guess is that is the problem. I have spent hours upon hours trying to get it to work using info... (0 Replies)
Discussion started by: Paul K
0 Replies
4. Programming
hi,
I have developed a very simple echo client/server application. I expect whenever i shutdown the server machine, the client peer detects the shutdown.In reality this doesn't happen and client continues to send and receive data.To my surprise, it even recv() returns with value greater than... (4 Replies)
Discussion started by: Sedighzadeh
4 Replies
5. Solaris
hi everyone.
As a solaris/unix beginner, I am trying a peer-to-peer connection with my Sun and Windows.
Here is my setup:
-Windows XP
-Sun System (Netra T1) which is connected to the console of the WinXP machine.
-Windows XP has wireless connection which enables me to access internet ... (3 Replies)
Discussion started by: graboid888
3 Replies
6. Shell Programming and Scripting
hi
i am connecting to a remote server using sftp protocol.
i am using the command like "sftp USER01@122.10.12.45"
then i got the error "Couldn't read packet: Connection reset by peer"
please help its very urgent (5 Replies)
Discussion started by: Satyak
5 Replies
7. UNIX for Advanced & Expert Users
Hey all !
I have a nice question ( maybe simple one ).
I coded a simple server , chat server. I want to implement send files options. But here I come to a nasty thing .. I cannot face out.
Let's say that two clients are already connected to the server.( clients are just from another contry... (0 Replies)
Discussion started by: !_30
0 Replies
8. UNIX for Dummies Questions & Answers
Hello all,
Ok here is my deal. I have almost convinced the wife to let me remove WIN2k from our family machine and install some flavor of open source. I'm think Red Hat at this piont.
The only things I need to keep her happy is some peer to peer file shareing program (like kazaa) and AIM or... (2 Replies)
Discussion started by: TAT2ME74
2 Replies
LFC-SETACL(1) LFC User Commands LFC-SETACL(1)
NAME
lfc-setacl - set LFC directory/file access control lists
SYNOPSIS
lfc-setacl [-d] [-m] [-s] acl_entries path...
DESCRIPTION
lfc-setacl sets the Access Control List associated with a LFC directory/file.
acl_entries is a comma separated list of entries. Each entry has colon separated fields: ACL type, id (uid or gid), permission. Only direc-
tories can have default ACL entries.
The entries look like:
user::perm
user:uid:perm
group::perm
group:gid:perm
mask:perm
other:perm
default:user::perm
default:user:uid:perm
default:group::perm
default:group:gid:perm
default:mask:perm
default:other:perm
The ACL type can be abbreviated to the first letter. The first "user" entry gives the permissions granted to the owner of the file. The
following "user" entries show the permissions granted to specific users, they are sorted in ascending order of uid. The first "group"
entry gives the permissions granted to the group owner of the file. The following "group" entries show the permissions granted to specific
groups, they are sorted in ascending order of gid. The "mask" entry is the maximum permission granted to specific users or groups. It
does not affect the "owner" and "other" permissions. The "mask" entry must be present if there are specific "user" or "group" entries.
"default" entries associated with a directory are inherited as access ACL by the files or sub-directories created in that directory. The
umask is not used. Sub-directories also inherit the default ACL as default ACL. As soon as there is one default ACL entry, the 3 default
ACL base entries (default user, default group, default other) must be present.
The entry processing conforms to the Posix 1003.1e draft standard 17.
The effective user ID of the process must match the owner of the file or the caller must have ADMIN privilege in the Cupv database.
path specifies the LFC pathname. If path does not start with /, it is prefixed by the content of the LFC_HOME environment variable.
uid can be given as the username or the corresponding numeric id.
gid can be given as the groupname or the corresponding numeric id.
perm can be expressed as a combination of characters rwx- or as a value between 0 and 7.
OPTIONS
-d remove ACL entries. The "perm" field is ignored.
-m modify existing ACL entries or add new entries.
-s set the ACL entries. The complete set of ACL entries is replaced.
EXAMPLES
Let's create a directory:
lfc-mkdir /grid/atlas/test/file.log/d6
and add write permission for user bcouturi:
lfc-setacl -m u:bcouturi:rwx,m:rwx /grid/atlas/test/file.log/d6
Let's create a directory:
lfc-mkdir /grid/atlas/test/file.log/d7
and add default ACLs to it:
lfc-setacl -m d:u::7,d:g::7,d:o:5 /grid/atlas/test/file.log/d7
Let's check the resulting ACLs:
lfc-getacl /grid/atlas/test/file.log/d7
# file: /grid/atlas/test/file.log/d7
# owner: baud
# group: c3
user::rwx
group::r-x #effective:r-x
other::r-x
default:user::rwx
default:group::rwx
default:other::r-x
Let's create a sub-directory and check the resulting ACLs:
lfc-mkdir /grid/atlas/test/file.log/d7/d2
lfc-getacl /grid/atlas/test/file.log/d7/d2
# file: /grid/atlas/test/file.log/d7/d2
# owner: baud
# group: c3
user::rwx
group::rwx #effective:rwx
other::r-x
default:user::rwx
default:group::rwx
default:other::r-x
Let's create a file in the same directory and check the resulting ACLs:
lfc-touch /grid/atlas/test/file.log/d7/f2
lfc-getacl /grid/atlas/test/file.log/d7/f2
# file: /grid/atlas/test/file.log/d7/f2
# owner: baud
# group: c3
user::rw-
group::rw- #effective:rw-
other::r--
EXIT STATUS
This program returns 0 if the operation was successful or >0 if the operation failed.
SEE ALSO
Castor_limits(4), lfc_chmod(3), lfc_chown(3), Cupvlist(1)
AUTHOR
LCG Grid Deployment Team
LFC
$Date: 2003/08/26 06:21:13 $ LFC-SETACL(1)