public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Re: Linux-kernel-daily-digest digest, Vol 1 #171 - 281 msgs
       [not found]   ` <01112112032600.01961@nemo>
@ 2001-11-21 15:18     ` Bill Crawford
  2001-11-21 17:39       ` vda
  0 siblings, 1 reply; 3+ messages in thread
From: Bill Crawford @ 2001-11-21 15:18 UTC (permalink / raw)
  To: vda; +Cc: linux-kernel

vda wrote:

> >  Perhaps we should not distinguish between read and execute on programs
> > either?  After all, they're not much different, are they?

 This was intended to be sarcastic :o)

> Yes, we can. In fact, NT lives with it with no problem. It is very common
> in NT to have rx on all readable files regardless of their 'executability'.
> If someone have 'r' perms, he can make a copy of a file, flag it with x and
> execute.

 In theory one can do just that on Un*x systems too.  That's why setid
bits can't be set by just anybody.

 What if the program is setuid and executable by a group but not other?
We do this with "su" on servers.

 Now, ACLs I want to see widely supported on Linux, and *used* properly
too.  They've been little used in most environments I've seen even on
systems that do support them, which is a shame as they are a necessary
and useful idea.  Yes, the Un*x permissions system does have some
limitations, but let's not break *all* the existing software and OSs
that use them, since what you're suggesting will not improve things.

> versions of it). It's too late. I've made patch for chmod which adds new +R
> flag to that effect.

 Why is that needed anyway?  By default directories get execute bit set
when they're created, at least in my environment; if you're extending
permissions you can use "go=u" or "o=g" to broaden the permissions, as
I would expect the existing perms to be correct on files vs directories
in most cases.

> --
> vda

-- 
/* Bill Crawford, Unix Systems Developer, Ebone (formerly GTS Netcom) */
#include <stddiscl>
const char *addresses[] = {
    "bill@syseng.netcom.net.uk", "Bill.Crawford@ebone.com",     // work
    "billc@netcomuk.co.uk", "bill@eb0ne.net"                    // home
};

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Linux-kernel-daily-digest digest, Vol 1 #171 - 281 msgs
  2001-11-21 15:18     ` Linux-kernel-daily-digest digest, Vol 1 #171 - 281 msgs Bill Crawford
@ 2001-11-21 17:39       ` vda
  2001-11-21 18:13         ` Bill Crawford
  0 siblings, 1 reply; 3+ messages in thread
From: vda @ 2001-11-21 17:39 UTC (permalink / raw)
  To: bill, Bill Crawford; +Cc: linux-kernel

On Wednesday 21 November 2001 15:18, Bill Crawford wrote:
>  Now, ACLs I want to see widely supported on Linux, and *used* properly
> too.  They've been little used in most environments I've seen even on
> systems that do support them, which is a shame as they are a necessary
> and useful idea.  Yes, the Un*x permissions system does have some
> limitations, but let's not break *all* the existing software and OSs
> that use them, since what you're suggesting will not improve things.

Hmm. I thought proper group management can let you live with std UNIX
file permissions model... NT ACLs are horrendously complex.
"Make it as simple as possible, but not simpler"

> > versions of it). It's too late. I've made patch for chmod which adds new
> > +R flag to that effect.

>  Why is that needed anyway?  By default directories get execute bit set
> when they're created, at least in my environment; if you're extending
> permissions you can use "go=u" or "o=g" to broaden the permissions, as
> I would expect the existing perms to be correct on files vs directories
> in most cases.

It is legitimate to do that. Do I really have to explain?

I have a script which is designed to sweep entire tree starting from /
and do some sanity checks. For example, it Opens Source:

chmod -R -c a+R /usr/src

8-)

--
vda

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Linux-kernel-daily-digest digest, Vol 1 #171 - 281 msgs
  2001-11-21 17:39       ` vda
@ 2001-11-21 18:13         ` Bill Crawford
  0 siblings, 0 replies; 3+ messages in thread
From: Bill Crawford @ 2001-11-21 18:13 UTC (permalink / raw)
  To: vda; +Cc: bill, linux-kernel

vda wrote:

> Hmm. I thought proper group management can let you live with std UNIX
> file permissions model... NT ACLs are horrendously complex.
> "Make it as simple as possible, but not simpler"

 You can, but there are situations where you end up with a combinatorial
explosion of groups to accommodate a matrix of possible permissions on
things.  And there is another significantly limiting factor which is the
restriction on the number of groups a process can belong to (currently
32 I believe).

 I think ACLs are a good solution to the problem, and indeed are what
*should* have been done originally ... however I suspect that would have
added a significant overhead to the original UNIX, and one of the great
benefits at the time was that UNIX was designed to run on pretty low-end
hardware.  VMS was a heavyweight beast on VAXen, did it ever run on PDP
machines?  There was a complex system :o)

 I'm thinking of Solaris' ACLs rather than NT, I don't know much about
the latter so I can't really comment on them.

> It is legitimate to do that. Do I really have to explain?

 No, I know what you're trying to do.  I have done it myself many times.
Why some sources come packed so they're only readable by root is beyond
me :o)

> I have a script which is designed to sweep entire tree starting from /
> and do some sanity checks. For example, it Opens Source:
> 
> chmod -R -c a+R /usr/src
> 
> 8-)

 OK, point conceded, although I can live with two passes for that sort
of thing.  Yours is a neat solution in fact.

> --
> vda

-- 
/* Bill Crawford, Unix Systems Developer, Ebone (formerly GTS Netcom) */
#include <stddiscl>
const char *addresses[] = {
    "bill@syseng.netcom.net.uk", "Bill.Crawford@ebone.com",     // work
    "billc@netcomuk.co.uk", "bill@eb0ne.net"                    // home
};

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2001-11-21 18:13 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
     [not found] <200111201202.fAKC2Md29689@lists.us.dell.com>
     [not found] ` <3BFA8AE2.2B5FA0@netcomuk.co.uk>
     [not found]   ` <01112112032600.01961@nemo>
2001-11-21 15:18     ` Linux-kernel-daily-digest digest, Vol 1 #171 - 281 msgs Bill Crawford
2001-11-21 17:39       ` vda
2001-11-21 18:13         ` Bill Crawford

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox