Date: Fri, 28 Jun 2013 15:34:59 +0200 From: Polytropon <freebsd@edvax.de> To: "Julian H. Stacey" <jhs@berklix.com> Cc: freebsd-questions <freebsd-questions@freebsd.org> Subject: Re: A very 'trivial' question about /root Message-ID: <20130628153459.4519d5b7.freebsd@edvax.de> In-Reply-To: <201306281325.r5SDPitf054224@fire.js.berklix.net> References: <1372407002.6831.34.camel@blackfriar.inhio.eu> <201306281325.r5SDPitf054224@fire.js.berklix.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 28 Jun 2013 15:25:44 +0200, Julian H. Stacey wrote: > Before we might ask (via send-pr) for it to be commited, > we should various of us run > chmod 750 /root;chown root:wheel /root > & give it a couple of months to see if problems. Done years ago: drwxr-x--- 7 root wheel 512 2013-04-05 21:42:34 /root/ System has been installed in August 2011. No problems so far. :-) > ( I'd guess OpenBSD might go for a tighter /root though, as they're > supposedly keen on security. ) Currently I've got no OpenBSD installation at hand to verify, but I _assume_ they still have the same defaults as FreeBSD regarding permissions of /root. > > if it leads to programs and daemons that > > would otherwise run as nobody having to run with root priviledges. > > Good point, we should be cautious, best if lots of us try chmod 750 /root > for a couple of months & see if any burnt fingers. What programs or daemons should attention be paid at, especially? -- Polytropon Magdeburg, Germany Happy FreeBSD user since 4.0 Andra moi ennepe, Mousa, ...
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130628153459.4519d5b7.freebsd>