Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I can't see why. Normally, binaries compiled by you are put in /usr/local/bin which are executable by everybody. I would think the way that you describe would be less secure than the normal way.
cheers,
jdk
I've found this method writen by some user who explained how to compile and install proftpd. So I didn't understand what's the benefit of installing as another user. I thought that this will not be more secure as installing by root.
You've mentioned that this method will be even more insecure. Can you explain why ?
If you put an executable in /usr/local/bin then in order to delete or modify it you must have root privileges. If you give ownership to a user then that user may also do this to the file. In general any non-reversible action to a file outside of your home directory should be done using root privileges. I hope this is clear enough.
cheers,
jdk
One of the more obscure permission-bits is called setuid, which may permit a program created by, say, root to execute with root's privileges rather than your own.
Nevertheless, not all installations manage everything using the root user. For example, in my tiny shop, all non-system applications are owned and installed by a non-root "maintenance user" (that's my term...) whose only purpose is to install programs ... and to own what has just been installed. This user doesn't have the privilege to install things in /usr/bin but instead installs them somewhere in /usr/local.
And so it goes. Programs which are "part of the Linux system" live one place, while programs which are system-wide user applications live elsewhere.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.