LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 01-06-2006, 07:34 AM   #1
GUIPenguin
Member
 
Registered: Aug 2004
Location: Maine
Distribution: Gentoo Linux
Posts: 239

Rep: Reputation: 30
Need help with Access Control Lists


http://www.djack.com.pl/Suse9hlp/ch27s03.html was what I was looking at..but I didn't really find the information I needed. I have emerged acl

Now what exactualy should I do for blocking read access to /etc for a specific, non-root user so he can't cd /etc

I know it is possible.
 
Old 01-06-2006, 07:46 AM   #2
aqoliveira
Member
 
Registered: Dec 2001
Location: Portugal
Distribution: /Red Hat/Fedora/Solaris
Posts: 622

Rep: Reputation: 30
Quote:
Originally Posted by GUIPenguin
http://www.djack.com.pl/Suse9hlp/ch27s03.html was what I was looking at..but I didn't really find the information I needed. I have emerged acl

Now what exactualy should I do for blocking read access to /etc for a specific, non-root user so he can't cd /etc

I know it is possible.
There are various ways in doing this but I think you could try chroot login. Essentially what this means is that when a log in is attempted, the user is authenticated in the normal way. After successful authentication, the login process passes the user to what it assumes is a shell, but in fact, it will be passing the user to a sieries of programs that will turn the user into root, chroot them into their directory, then turn the user back into himself again.

http://www.tjw.org/chroot-login-HOWTO/

cheers
 
Old 01-06-2006, 07:49 AM   #3
GUIPenguin
Member
 
Registered: Aug 2004
Location: Maine
Distribution: Gentoo Linux
Posts: 239

Original Poster
Rep: Reputation: 30
Quote:
Originally Posted by aqoliveira
There are various ways in doing this but I think you could try chroot login. Essentially what this means is that when a log in is attempted, the user is authenticated in the normal way. After successful authentication, the login process passes the user to what it assumes is a shell, but in fact, it will be passing the user to a sieries of programs that will turn the user into root, chroot them into their directory, then turn the user back into himself again.

http://www.tjw.org/chroot-login-HOWTO/

cheers
thanks.. I know how to do chrooted environments for my users but want to use acls to limited more specific directorys... so if anyone knows how to do it specificly please post. Thanks.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Squid Access Control Lists Basics Palula Linux - Software 1 11-22-2005 05:29 PM
MAC access lists. unreal128 Linux - Networking 8 04-20-2005 08:56 AM
setup linux Access control Lists adrianmak Linux - Security 2 01-12-2003 02:56 PM
Access Control lists on directories riteshsarraf Linux - Security 0 10-22-2002 06:25 AM
Access Control Lists wgriffin43 Linux - Software 2 09-23-2002 07:54 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:44 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration