View previous topic :: View next topic |
Author |
Message |
nihon-jin n00b
![n00b n00b](/images/ranks/rank_rect_0.gif)
Joined: 08 Jan 2004 Posts: 46 Location: Rennes {France}
|
Posted: Wed Jun 23, 2004 4:47 pm Post subject: Defining what an user can run |
|
|
hello.
I would like to know what is the best way of defining what applications can one user/group run. Let's say that I would like to have 2 groups of users like normal & priviledged where users in "normal" group should have access only to some commands (ie cp, mv, scp (all file handling stuff) and than mutt, irssi and few applications) whereas users in priviledged group should be able to access almost everything.
The method I was thinking about was to change permissions on files in /usr/bin and /bin (like chgrp them to 'priviledged' and than chmod them to 550 or so) but I don't know if this is really a good method.
thank you for any advice |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
Gatta n00b
![n00b n00b](/images/ranks/rank_rect_0.gif)
Joined: 28 Mar 2004 Posts: 53
|
Posted: Wed Jun 23, 2004 5:37 pm Post subject: Sounds good |
|
|
That's probably the best method I can think of. For extra security, the NSA have made a securer kernel involving mandatory access control, but that might be overkill for you-your idea will work OK. |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
spudicus Apprentice
![Apprentice Apprentice](/images/ranks/rank_rect_2.gif)
![](images/avatars/gallery/Star Wars/movie_star_wars_darth_vader.gif)
Joined: 05 Dec 2002 Posts: 177 Location: Geraldton, Australia
|
Posted: Thu Jun 24, 2004 12:03 am Post subject: Re: Defining what an user can run |
|
|
nihon-jin wrote: | I would like to know what is the best way of defining what applications can one user/group run. Let's say that I would like to have 2 groups of users like normal & priviledged where users in "normal" group should have access only to some commands (ie cp, mv, scp (all file handling stuff) and than mutt, irssi and few applications) whereas users in priviledged group should be able to access almost everything.
The method I was thinking about was to change permissions on files in /usr/bin and /bin (like chgrp them to 'priviledged' and than chmod them to 550 or so) but I don't know if this is really a good method. |
The ?best? way would be to use some form of acl, e.g. SeLinux, Rsbac, Grsecurity. However, this is also the more complex way, as stated by Gatta.
The ?easiest? way would be to use Linux's built-in file permissions.
These two articles; 1, and 2,
could help refresh some of the intricacies of linux permissions.
If you take this route, I have a script and C code, here, for backing up and restoring your original permissions, if and when you break something.
One method you could take with linux file permissions, is to define a group unpriv (or something). Then select which programs/directories they aren't allowed to access, change them to the unpriv group, and chmod 705. |
|
Back to top |
|
![](templates/gentoo/images/spacer.gif) |
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|