General :: Restrict File Access To The Root User Of One Particular Host?
Aug 12, 2010
If there is a general NFS share in the LAN and for example this share has three files - a, b, c is there any way to restrict file access to the root user of one particular host(falcon) in the same LAN environment while the normal users from the same host(falcon) should be able to access the NFS share & files a, b, c.
If there is a general NFS share in the LAN and for example this share has three files - a, b, c is there any way to restrict file access to the root user of e particular host(falcon) in the same LAN environment while the normal users from the same host(falcon) should be able to access the NFS share & files a, b,
I heard we can set security in /etc/hosts.allow and /etc/hosts.deny on user base also like something user@domain or something if so how can I restrict a user to access particular service by his/her user name in a particular host via /etc/hosts.allow or /etc/hosts.deny
2 of us have been googling all morning trying to find out how we can restrict ftp logins to their own home directories only but nothing we've found so far has worked. We've tweaked sshd_config so that they default to their home directory but they are able to navigate up/across/down to everything. This is a "straight-out-of-the-box" debian 5.0.5 Netinst. Just a basic system with Apache/MySql/PHP/SSH and no desktop.
i want to install a software in my linux machine staying in another user that i have created .It is asking for root access for some command to be execute during installation process.when I am trying to execute "sudo -s" its showing " is not in the sudoers file. This incident will be reported.".what next will i do.I am in my ubuntu machine.
I'm running a Virtual Box with Ubuntu 9.10 and I'm experimenting with Apache 2.2.12I would like to use the authz_owner module but it is not possible for me to access http://localhost/~b/private/"b" is my username and "private" is the directory definded in the httpd.conf file.My httpd.conf file:
How to allow access to some commands having root privleges to be run by non root user. I am new to unix/linux and I have a major assignment. I have to find ways to run particular commands which can be run only by root from a non root user. I know sudo is one of the way but i need some different approach.
I am a user of a cluster. I don't want root to see/copy files from my user account(obviously). Is that possible to limit the access of root to users account?
First, I am new to linux I just finished installing Fedora 14 on a different PC which I will be using solely to explore Linux. However the first annoying problem I encountered was that I can't do a lot of things without Linux asking me for the root password. This has become really annoying, I want to stop fedora from asking for root authentication every time I want to explore something here and there.
Among the work-arounds that I've tried and didn't quite work for me are: 1. login as root on the kdm - I can login as root but because I am also encouraging my sister to explore fedora 14 she needs the same access as root too. We have our own preferences so we both need individual accounts that have same access level as root.
2. change userid to 0 (same as root) and modify groups to be exactly the same as root's groups - very bad solution, what it did was make my user a sort of "alias" for the root. It basically uses the same /root/ folder, same settings and all that stuff. Again, my sister and I need separate accounts for a more personal feel.
3. use terminal and go sudo, sudoers, etc - very bad idea, I want to explore using the kde gui. And again I want to eliminate the inconvenience of having to type things over and over again. I'd rather type the password over and over again than having to use terminal and sudo everything.
4. beesu, gksu - anyone knows how to make linux automatically wrap everything with beesu/gksu?
since we are just exploring, we are willing to trade the systems, integrity and security for the convenience of having freedom to explore everything in it. I don't care, it could blow up the pc for all I care (it's old and for experiment anyway).
This exploring linux of ours is a make or break for us to using linux. If there is no solution to this problem, we'll probably scrap the whole "migrate to linux" idea.
I thinking of making Linux recognize our user id the same way it recognizes uid 0 but I have no idea how to do this.
I found that if any usual user is logged into a NDS-tree, then _local_ root has full access to user's network shares, including the user's home directory located on remote Netware-server. Is it by design or have I missed something? Nevertheless in windows local admin has no access to network resources mounted of any other user. If you runas shell (as admin) then admin in principle can't "see" network shares which were mounted (connected) by other users - they are accessible ("visible") per session.
I'm a terrible procrastinator, it's awe-inspiring annoying and stressful. This in combination with being a information-holic makes the Internet fairly lethal to me; I risk failing my college course because of it, so trust me when I say I'm deadly serious about this.
However, I think you guys may be able to help out, and maybe this will also help some people here with similar problems:
Because so much of my time is taken up with Interwebz, I thought to carefully restrict my internet use. It's not prefect, but it's part of a solution.
To date: I have Firefox and the ProCon extension which uses a whitelist of websites I can access. The extension cannot be uninstalled/disabled and I use a long hex password split into 3 parts, two of which my friends have (so I have to ask my friends for the password parts in order to update the whitelist, hence making it socially awkward to fritter away time online).
So far, it has worked a treat and I'm really pleased with it.
However, this is the problem:
I need to restrict web access so *only* Firefox can access the web. That way I cannot use Chrome/Opera, or even (shudder) use wine to run Internet Exploder.
During set-up of a home server (running Kubuntu 10.04), I created an admin user for performing administrative tasks that may require an unmounted home. This user has a home directory on the root partition of the box. The machine has an internet-facing SSH server, and I have restricted the set of users that can connect via SSH, but I would like to restrict it further by making admin only accessible from my laptop (or perhaps only from the local 192.168.1.0/24 range). I currently have only an
I have written a simple server application (with an HTTP interface). I want to ensure that only calls from the local machine are processed - i.e. I want to prevent outsiders from accessing/using my server.
How may I restrict outsiders (i.e. requests from remote machines)?
I need to customize linux kernel root file system for embedded linux system. During compile time, for root file system I am able to create different user/group ex: "gnumuzic/Muzic". But I want to give access to group "Muzic" to some folders like /dev/nexig during compile time.
I Want to be able to let my girlfriend view my pictures folder while at the same time keeping my sister out. So I created a group "JessAndI" and made myself and her apart of that group. I changed the group of the directory recursively to "JessAndI" and gave the permissions to 770. She still isn't able to access or even view the directory unless i change the permissions to allow others whether it be 774 or 777. Am i doing something wrong? I've checked and double checked to make sure she is part of the group and the group is the group on the directory and all the sub-directories and files.
I want to limit delete of a particular folder in the user's home folder and to restrict any add/change/delete on files in that restricted directory. /home/myuser /home/myuser/_protected //no delete /home/myuser/_protected/1.txt //only read How can I do that on Ubuntu server?
It's been a few years since I last installed Ubuntu. I searched the forums and can't seem to find the answer. I want to be able to do a "su root" and have root access. I know Ubuntu wants you to do the sudo command, and I know you can really mess things up being root. I know I got this to work before. What do I need to do?