Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 28 Jun 2013 15:34:59 +0200
From:      Polytropon <freebsd@edvax.de>
To:        "Julian H. Stacey" <jhs@berklix.com>
Cc:        freebsd-questions <freebsd-questions@freebsd.org>
Subject:   Re: A very 'trivial' question about /root
Message-ID:  <20130628153459.4519d5b7.freebsd@edvax.de>
In-Reply-To: <201306281325.r5SDPitf054224@fire.js.berklix.net>
References:  <1372407002.6831.34.camel@blackfriar.inhio.eu> <201306281325.r5SDPitf054224@fire.js.berklix.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 28 Jun 2013 15:25:44 +0200, Julian H. Stacey wrote:
> Before we might ask (via send-pr) for it to be commited,
> we should various of us run
> 	chmod 750 /root;chown root:wheel /root
> & give it a couple of months to see if problems.

Done years ago:

drwxr-x---  7 root  wheel  512 2013-04-05 21:42:34 /root/

System has been installed in August 2011. No problems so far. :-)



> ( I'd guess OpenBSD might go for a tighter /root though, as they're
>   supposedly keen on security. )

Currently I've got no OpenBSD installation at hand to verify,
but I _assume_ they still have the same defaults as FreeBSD
regarding permissions of /root.


> > if it leads to programs and daemons that
> > would otherwise run as nobody having to run with root priviledges.
> 
> Good point, we should be cautious, best if lots of us try chmod 750 /root
> for a couple of months & see if any burnt fingers.

What programs or daemons should attention be paid at, especially?



-- 
Polytropon
Magdeburg, Germany
Happy FreeBSD user since 4.0
Andra moi ennepe, Mousa, ...



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20130628153459.4519d5b7.freebsd>