LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - General
User Name
Password
Linux - General This Linux forum is for general Linux questions and discussion.
If it is Linux Related and doesn't seem to fit in any other forum then this is the place.

Notices


Reply
  Search this Thread
Old 08-15-2007, 07:47 PM   #1
marales314
LQ Newbie
 
Registered: Dec 2004
Distribution: Debian
Posts: 26

Rep: Reputation: 16
What do those obscure user accounts mean?


In my linux installation there are a few user accounts that I don't understand, such as "bin", "sync", "sys", "lp", "proxy", and "daemon". Why are they there?
 
Old 08-15-2007, 08:32 PM   #2
cgjones
Member
 
Registered: Nov 2005
Location: Central New York
Distribution: Ubuntu
Posts: 405

Rep: Reputation: 31
From the Securing Debian Manual

Quote:
daemon: Some unprivileged daemons that need to write to files on disk run as daemon.daemon (e.g., portmap, atd, probably others). Daemons that don't need to own any files can run as nobody.nogroup instead, and more complex or security conscious daemons run as dedicated users. The daemon user is also handy for locally installed daemons.

bin: maintained for historic reasons.

sys: same as with bin. However, /dev/vcs* and /var/spool/cups are owned by group sys.

sync: The shell of user sync is /bin/sync. Thus, if its password is set to something easy to guess (such as ""), anyone can sync the system at the console even if they have don't have an account.

lp: Used by printer daemons.

proxy: Like daemon, this user and group is used by some daemons (specifically, proxy daemons) that don't have dedicated user id's and that need to own files. For example, group proxy is used by pdnsd, and squid runs as user proxy.
 
Old 08-15-2007, 08:33 PM   #3
Daws
Member
 
Registered: May 2006
Location: UK
Distribution: Debian
Posts: 447

Rep: Reputation: 39
You are listed as using Debian. If this is still the case then take a look at /usr/share/doc/base-passwd/users-and-groups.html or the txt version. Here are some of the highlights for the users you listed:

Quote:
bin

HELP: No files on my system are owned by user or group bin. What good are
they? Historically they were probably the owners of binaries in /bin? It is
not mentioned in the FHS, Debian Policy, or the changelogs of base-passwd
or base-files.

LSB 1.3 lists bin as legacy, and says: "The 'bin' UID/GID is included for
compatibility with legacy applications. New applications should no longer
use the 'bin' UID/GID."

sync

The shell of user sync is /bin/sync. Thus, if its password is set to
something easy to guess (such as ""), anyone can sync the system at the
console even if they have no account on the system.

sys

HELP: As with bin, except I don't even know what it was good for
historically.

I'm told that /var/spool/cups is owned by group sys, dunno why.

lp

The lp* devices are writable by this group so that users in it can access
the parallel ports directly. Traditionally this job is taken by a printer
daemon instead which will only need to run in this group.

The lpr system keeps its spool directories owned by lp/lp. Its daemon and
frontend tools (through setuid) run as user root.

HELP: what do other print systems (rlpr, lprng, ...) do?

daemon

Some unprivileged daemons that need to be able to write to some files on
disk run as daemon.daemon (portmap, atd, jabberd, lambdamoo, mon, and
others). Daemons that don't need to own any files sometimes run as
nobody.nogroup instead; it is generally better practice to use a dedicated
user, and more complex or security-conscious daemons certainly do this. The
daemon user is also handy for locally installed daemons, probably.

LSB 1.3 lists daemon as legacy, and says: "The 'daemon' UID/GID was used as
an unprivileged UID/GID for daemons to execute under in order to limit
their access to the system. Generally daemons should now run under
individual UID/GIDs in order to further partition daemons from one
another."

proxy

Like daemon, this user and group is used by some daemons (specifically,
proxy daemons) that don't have dedicated user ids and that need to own
files. For example, group proxy is used by pdnsd, and squid runs as user
proxy.
Unfortunately it appears that some of the answers you seek may be buried in time...
 
Old 08-16-2007, 12:35 AM   #4
marales314
LQ Newbie
 
Registered: Dec 2004
Distribution: Debian
Posts: 26

Original Poster
Rep: Reputation: 16
Thank You

Thanks, I looked at both the Securing Debian Manual and the users-and-groups page, and they are both exactly what I was looking for.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
user accounts rmorgan Linux - Server 0 10-31-2006 10:40 AM
LXer: Linux 101: Manage user accounts in a multi-user Linux environment ... LXer Syndicated Linux News 0 06-27-2006 07:03 AM
User Accounts Cool_Hand_Luke Linux - Newbie 6 08-24-2005 08:35 PM
User Accounts Kemik Linux - Newbie 13 01-12-2005 04:24 PM
User Accounts MrJoshua Linux - General 3 01-10-2003 08:30 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - General

All times are GMT -5. The time now is 09:48 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration