Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place! |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
08-23-2012, 09:23 AM
|
#1
|
Member
Registered: Jun 2010
Location: India
Distribution: Fedora/Cent OS
Posts: 123
Rep:
|
Open file using sudo
I have a file "abc" which has 700 permission.
I want to set something in sudoers file so that a user "somename" have full privilege to it.
*What are the best practices to perform the above task.
|
|
|
08-23-2012, 09:26 AM
|
#2
|
Member
Registered: Aug 2012
Location: /home/byannoni
Distribution: Arch
Posts: 128
Rep:
|
I don't think you can do that in sudoers, but you can do this:
|
|
|
08-23-2012, 09:36 AM
|
#3
|
Member
Registered: Jun 2010
Location: India
Distribution: Fedora/Cent OS
Posts: 123
Original Poster
Rep:
|
Wee it seems that sudoers file is used only to gain access to some commands. but it cannot be used to give permission to a user to modify the contents of a file 
|
|
|
08-23-2012, 10:45 AM
|
#4
|
LQ Guru
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 27,663
|
Quote:
Originally Posted by abhinav4
Wee it seems that sudoers file is used only to gain access to some commands. but it cannot be used to give permission to a user to modify the contents of a file 
|
Right...so why can't you do what you want, since you just (essentially) said that sudo can do it?
Give ONE user permission to use ONE command. That command can be "vi <some file name>". Change the ownership of the file to only allow root to access it, so then either root or that one user (via "sudo vi <some file name>") can edit it.
|
|
|
08-23-2012, 03:09 PM
|
#5
|
Moderator
Registered: Mar 2008
Posts: 22,361
|
I think I'd have changed the group or owner to this user so that they could do some task before I gave them sudo.
|
|
1 members found this post helpful.
|
08-23-2012, 03:18 PM
|
#6
|
LQ Guru
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 27,663
|
Quote:
Originally Posted by jefro
I think I'd have changed the group or owner to this user so that they could do some task before I gave them sudo.
|
That's another way to do it, which will work just fine, too. However, I tend to lean towards sudo for things just like this, mainly because of the auditing purposes. A user can modify/delete their shell history, but (if you only give them sudo rights for ONE COMMAND), can't edit the sudo logs, and you can see what they did, and when.
The same thing can be accomplished either way, though, but the OP did ask about sudo specifically.
|
|
|
08-23-2012, 05:58 PM
|
#7
|
LQ Guru
Registered: Aug 2004
Location: Sydney
Distribution: Rocky 9.x
Posts: 18,434
|
Unfortunately, tools like vi enable you to escape to the shell, then all bets are off ...
I'd go with user or group ownership & set the perms as needed or (more fine-grained) use an ACL.
|
|
|
08-23-2012, 06:04 PM
|
#8
|
Member
Registered: Aug 2012
Location: /home/byannoni
Distribution: Arch
Posts: 128
Rep:
|
Quote:
Originally Posted by chrism01
Unfortunately, tools like vi enable you to escape to the shell, then all bets are off ...
I'd go with user or group ownership & set the perms as needed or (more fine-grained) use an ACL.
|
That is a good point, but:
Quote:
Originally Posted by TB0ne
if you only give them sudo rights for ONE COMMAND
|
Don't give them a command that will let them escape to the shell. Be careful, but if you know what you're doing, you won't have that problem.
|
|
|
08-23-2012, 06:16 PM
|
#9
|
LQ Guru
Registered: Aug 2004
Location: Sydney
Distribution: Rocky 9.x
Posts: 18,434
|
Quote:
I want to set something in sudoers file so that a user "somename" have full privilege to it.
|
Need the OP to define 'full privilege'.
In any case my point stand; sudo is designed to control what cmds/tools you can run.
It cannot protect files and many cmds have a way to break out into the shell, even if its just ctrl-C or similar.
See the Security Notes here http://linux.die.net/man/8/sudo
|
|
|
08-24-2012, 06:02 AM
|
#10
|
Member
Registered: Jun 2010
Location: India
Distribution: Fedora/Cent OS
Posts: 123
Original Poster
Rep:
|
Putting above line in sudoers file made me achieve what i was trying, and I do not think it is a security hole.
Last edited by abhinav4; 08-24-2012 at 06:04 AM.
|
|
|
08-24-2012, 07:39 AM
|
#11
|
Member
Registered: Apr 2006
Location: Nairobi
Distribution: CentOS
Posts: 78
Rep:
|
I think you need to use FACL (File Access Lists) to achieve what you want.
You need to make sure that the filesystem has been mounted with the acl option.
Code:
[root@docserver ~]# cat /etc/fstab
/dev/VolGroup00/LogVol00 / ext3 defaults,acl 1 1
LABEL=/boot /boot ext3 defaults 1 2
Remount the filesystem
Verify the options have been applied
Code:
[root@server ~]# mount -l
/dev/mapper/VolGroup00-LogVol00 on / type ext3 (rw,acl)
Now user2 has "full control" over secretfile
Code:
setfacl -m u:user2:x /home/user1/
setfacl -m u:user2:rwx /home/user1/secretfile
|
|
|
08-24-2012, 08:43 AM
|
#12
|
Member
Registered: Jun 2010
Location: India
Distribution: Fedora/Cent OS
Posts: 123
Original Poster
Rep:
|
Quote:
Originally Posted by iamwilliam
I think you need to use FACL (File Access Lists) to achieve what you want.
You need to make sure that the filesystem has been mounted with the acl option.
Code:
[root@docserver ~]# cat /etc/fstab
/dev/VolGroup00/LogVol00 / ext3 defaults,acl 1 1
LABEL=/boot /boot ext3 defaults 1 2
Remount the filesystem
Verify the options have been applied
Code:
[root@server ~]# mount -l
/dev/mapper/VolGroup00-LogVol00 on / type ext3 (rw,acl)
Now user2 has "full control" over secretfile
Code:
setfacl -m u:user2:x /home/user1/
setfacl -m u:user2:rwx /home/user1/secretfile
|
Thanks but the whole question was to do it from sudoers file 
|
|
|
All times are GMT -5. The time now is 06:24 AM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|