Questions tagged [permissions]

In computing, permissions (often called "privileges," "access rights" or just "rights") are rules associated with objects on a computer or network. Permissions determine which objects can access which objects, and to what extent.

In computing, permissions (often called "privileges," "access rights" or just "rights") are rules associated with objects on a computer or network. Permissions determine which objects can access which objects, and to what extent.

For example, file permissions are rules placed on a filesystem object defining which accounts are allowed to access the object, and what actions those accounts can take on the object, such as read, write and/or delete.

3641 questions
30
votes
2 answers

Why is it bad to have root writing files to a directory not owned by root?

This came up in a comment to another question and I'd love it if someone could explain the reasons for this to me. I suggested having Apache log the errors for a given VHost to a user's home directory. This was shot down because it was insecure.…
Bart B
  • 3,457
  • 6
  • 31
  • 42
29
votes
3 answers

How to mount volume with specific UID in Kubernetes Pod?

So, I'm trying to get Nexus running based off of this image in Kubernetes, but it's failing with: mkdir: cannot create directory '../sonatype-work/nexus3/log': Permission denied mkdir: cannot create directory '../sonatype-work/nexus3/tmp':…
srkiNZ84
  • 571
  • 1
  • 6
  • 10
27
votes
4 answers

How do I list virsh networks without sudo?

I noticed a strange behavior on one machine using Debian that I can't reproduce on another machine running Ubuntu. When listing virsh networks as an ordinary user, it shows an empty list: ~$ virsh net-list --all Name State …
Arseni Mourzenko
  • 2,275
  • 5
  • 28
  • 41
26
votes
6 answers

Force ssh to ignore id_rsa permissions

I have a very specific requirement that requires a private key to be used by multiple users. I know how bad this is. The problem is that if the identity file's permission is to permissive (444 in my case) ssh will simply ignore…
mshohayeb
  • 391
  • 1
  • 4
  • 6
26
votes
5 answers

I can't delete files 'rm: cannot remove X Read-only file system'

I am trying to remove an rdiff backup folder as some problems occured during the backup and need to remove it's history and try again. However, when I run: rm -r -f rdiff-backup-data I get the following on some of the files: rm: cannot remove `X':…
David
  • 841
  • 3
  • 14
  • 31
24
votes
1 answer

Apache logs other user read permissions

We have several developers who maintain the system and I want them to easily read the log files in /var/log/httpd without needing root access. I set the read permission for 'other' users but when I run tail on the log files I get permission…
user2344668
  • 361
  • 1
  • 2
  • 5
24
votes
7 answers

How to deny the web access to some files?

I need to do an operation a bit strange. First, i run on Debian, apache2 (which 'runs' as user www-data) So, I have simple text file with .txt ot .ini, or whatever extension, doesnt matter. These files are located in subfolders with a structure like…
Strae
  • 457
  • 1
  • 8
  • 22
23
votes
5 answers

Files mounted over NFSv4 are owned by 4294967294, UIDs and GIDs match

I have two identical linux machines (identical images launched in amazon EC2) and I am trying to mount an exported directory over NFSv4. Here is what the mounted directory looks like on the client machine: root@server:~# ls -l /websites/ drwxr-xr-x …
jberryman
  • 914
  • 2
  • 10
  • 25
23
votes
7 answers

Copy permissions to identical tree on linux / unix

i have a tree of files with correct permission. then i have a (filewise) identical tree (with different file contents tough) with wrong permissions. how can i transfer the permissions layout from one tree to another?
yawniek
  • 375
  • 1
  • 3
  • 10
23
votes
5 answers

`Permission Denied` to CD into a directory even though permissions are correct

This is so wierd. Logged in to a Linux (RHEL) box as a user 'g', doing an ls -lah shows drwxrwxrwx 6 g g 4.0K Jun 23 13:27 . drwxrw-r-x 6 root root 4.0K Jun 23 13:15 .. -rwxrw---- 1 g g 678 Jun 23 13:26 .bash_history -rwxrw---- 1 g g…
user80776
23
votes
7 answers

What is the most secure way to allow a user read access to a log file?

My application requires read access to /var/log/messages, which belongs to user and group root. What is the minimal exposure level required on /var/log/messages so my application can read it? Presently, my plan is to change the group ownership of…
gAMBOOKa
  • 999
  • 6
  • 19
  • 34
23
votes
4 answers

fstab and cifs mounting, possible to store authentication information outside of fstab?

I am currently using cifs to mount some network shares (that require authentication) in /etc/fstab. It works excellently, but I would like to move the authentication details (username/pass) outside of fstab and be able to chmod it 600 (as fstab can…
TJ L
  • 474
  • 3
  • 7
  • 18
23
votes
2 answers

What is the sticky bit in UNIX file systems? When is it used?

What is the sticky bit in a UNIX file system? As an admin when and how would you use it?
Aaron K
  • 1,525
  • 5
  • 18
  • 16
22
votes
2 answers

chmod -R makes files in child folders ureadable for some reason

I was adjusting the permissions when setting up some WordPress themes, and ran chmod 664 -R theme-dir/* It worked fine on the files in the root of the directory, but all the files in subdirectories now read like this when I ls -l: ?--------- ? ? ?…
Sal
  • 223
  • 1
  • 4
22
votes
7 answers

"Error Applying Security - Access is denied" while changing file permissions on windows server 2008

I'm an administrator on a Windows 2008 server. When I try to change file permissions on a directory, I get an error: Error Applying Security Access is denied. I am an administrator on the machine, and I made sure nothing has the file(s) locked…
adambox
  • 827
  • 4
  • 9
  • 14