LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - General
User Name
Password
Linux - General This Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.

Notices


Reply
  Search this Thread
Old 05-29-2020, 08:20 PM   #1
That Random Guy
Member
 
Registered: Jun 2017
Posts: 81

Rep: Reputation: Disabled
Is it a good idea to use setfacl for additional group permissions?


Hello,

Long story short, I spun up a VM loaded with RHEL and had to install Oracle DBMS on it (for work).

After some nifty tutorials, I wound up with the "application" directory for Oracle and it's component right under / in a folder called u01.

The problem later became that my PM did not want me giving away the oracle account to some outside folk who do not deal with our work on a day-to-day basis. This made sense as the oracle user was used to install the DBMS and is the owner for the entire directory and its subcontents.

For whatever reason, in my head at the time, I came up with the suggestion to just come up with a new group (I blame Microsoft). After some Googling, I discovered I could then give this group explicit access to particular files/folders where this outside/additional person was requesting access for—items which existed inside this oracle directory (u01).

TL;DR:
Fast forward to today, I have been successful in enabling access to the resources this person has been asking for (e.g. log files) by adding them to the new group and then using setfacl to update the ACLs to include necessary permissions for this group on the requested resource. This new group is not the associated group in any of the objects found under the application folder where as otherwise listed from a command like ls -l.

My question is now: is this a bad thing to do? For those who have more experience than I or who have a better understanding of Unix/Linux permissions, have you ever encountered unexpected consequences from doing something like this?

My concern is that I'm probably not following some best practice for access control when it comes to file permissions and the like.
 
Old 05-31-2020, 02:08 AM   #2
rnturn
Senior Member
 
Registered: Jan 2003
Location: Illinois (SW Chicago 'burbs)
Distribution: openSUSE, Raspbian, Slackware. Previous: MacOS, Red Hat, Coherent, Consensys SVR4.2, Tru64, Solaris
Posts: 2,800

Rep: Reputation: 550Reputation: 550Reputation: 550Reputation: 550Reputation: 550Reputation: 550
Quote:
Originally Posted by That Random Guy View Post
Hello,

Long story short, I spun up a VM loaded with RHEL and had to install Oracle DBMS on it (for work).

After some nifty tutorials, I wound up with the "application" directory for Oracle and it's component right under / in a folder called u01.
Heh. Haven't dealt with OFA for a while.

Quote:
The problem later became that my PM did not want me giving away the oracle account to some outside folk who do not deal with our work on a day-to-day basis. This made sense as the oracle user was used to install the DBMS and is the owner for the entire directory and its subcontents.

For whatever reason, in my head at the time, I came up with the suggestion to just come up with a new group (I blame Microsoft). After some Googling, I discovered I could then give this group explicit access to particular files/folders where this outside/additional person was requesting access for—items which existed inside this oracle directory (u01).

TL;DR:
Fast forward to today, I have been successful in enabling access to the resources this person has been asking for (e.g. log files) by adding them to the new group and then using setfacl to update the ACLs to include necessary permissions for this group on the requested resource. This new group is not the associated group in any of the objects found under the application folder where as otherwise listed from a command like ls -l.

My question is now: is this a bad thing to do? For those who have more experience than I or who have a better understanding of Unix/Linux permissions, have you ever encountered unexpected consequences from doing something like this?

My concern is that I'm probably not following some best practice for access control when it comes to file permissions and the like.
IMHO, that's what ACLs excel at: providing fine-grained access to files and directories over the standard user:group permissions. (Back in my VMS days, I configured project directories to have no standard permissions at all except through the ACL mechanism so that users not associated with a project and didn't have the necessary rights identifiers couldn't go wandering around its files.)

The last time I worked on a system with Oracle, we had two groups "dba" for the DBAs (duh) and "orauser" for the people who merely "used" the database instance(s). Not sure if we needed to grant access to someone not a member to either of those groups to have access to "u01" (or, in our case, "/u0[1-4]") but the following may be a situation similar to your's. I occasionally got calls from a DBA who couldn't access a file. The DBAs (joe:users, bob:users, etc.) would work on scripts and wind up owning the modified script preventing another DBA from modifying it without me changing the permissions for them. They'd start fooling around with their mask, chmod, chown, and have permissions all boogered up. An ACL giving anyone in the "dba" group read/write access to the scripts (and the directory they lived in) was the simplest solution. It wasn't a permissions problem with the "/u01" tree but I suspect it's similar to what you are/were encountering.

The "consequences" weren't unexpected and involved getting the DBAs trained to realize that normal permissions they'd see via "ls -l" may not be giving them the whole picture.

HTH...
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] setfacl and granting permissions to a group and its members on a directory devUnix Linux - General 7 08-08-2013 12:12 AM
setfacl changes group permissions; giving another user rw permissions secretlydead Linux - Server 4 09-22-2012 11:12 PM
file permissions using setfacl dsirrine Linux - General 1 12-17-2009 05:10 PM
setfacl - how to set files to be saved as a particular user:group? neocontrol Linux - Security 2 03-12-2008 08:39 PM
Good idea/bad idea: interface colors introuble General 5 10-30-2006 01:33 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - General

All times are GMT -5. The time now is 11:56 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration