Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 1 Nov 2001 22:43:21 +1100
From:      Edwin Groothuis <edwin@mavetju.org>
To:        Anthony Atkielski <anthony@atkielski.com>
Cc:        FreeBSD Questions <freebsd-questions@freebsd.org>
Subject:   Re: Tiny starter configuration for FreeBSD
Message-ID:  <20011101224321.H35710@k7.mavetju.org>
In-Reply-To: <006b01c162c4$c6597cb0$0a00000a@atkielski.com>; from anthony@atkielski.com on Thu, Nov 01, 2001 at 12:03:00PM %2B0100
References:  <005a01c161ed$a19933c0$1401a8c0@tedm.placo.com> <5.1.0.14.2.20011101165340.02192a40@pop.ozemail.com.au> <005301c162bd$59ac2740$0a00000a@atkielski.com> <006e01c162bf$8c5d87e0$0b64a8c0@becca> <006b01c162c4$c6597cb0$0a00000a@atkielski.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Nov 01, 2001 at 12:03:00PM +0100, Anthony Atkielski wrote:
> > How much more granular do you want?
> 
> The ability to assign permissions by user is very important.  That is, user A
> must be able to read and write, user B must be able to execute only, and so on.

I have been following this thread for a while and have a couple of
questions/remarks:

Is this true:

    The Windows security is based on who is running the console.
    There can't be more than one person logged in at the same time.

    The Unix security is based on who is logged in on the terminal.
    There are numerous terminals on a Unix system.

If this above is true, it would explain the reasoning why there
are so many different groups in which you can put people (like:
group which can use the diskdrive, group which can erase the
trashcan, group which can setup tcp-sessions, group which can flush
the toilet) because of the impossibility to make changes if you
are not in the right group:

For a Unix-system, if the admin wants to change something for a
user, he often remotely logs in, makes the changes and logs off.

For a Windows-system, the current user has to logoff, the admin
has to login, make the change, logoffs and the user logs in again.


Me myself I don't have problems with the one-person-who-can-do-anything
principle because the seperation in groups is already built-in
under Unix (how I see it):

For example we needed a group of people who could restart a name-daemon.
One small script, owned by user root and group dnsadmin, permissions
4755: Only people who were in the group dnsadmin could do the task.

Another example for the network-troubleshooters: put these people
in the network group and they have read access to /dev/bpf*. No
need for root-access if they want to run tcpdump.


Maybe your example wasn't well formulated and you want to do it again?
Of course it can be that my examples weren't what you expected to
be, but these are from my experiences as system administrator who
had to walk between total user-anarchy vs system-security.

Edwin

-- 
Edwin Groothuis   |              Personal website: http://www.MavEtJu.org
edwin@mavetju.org |           Interested in MUDs? Visit Fatal Dimensions:
------------------+                       http://www.FatalDimensions.org/

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011101224321.H35710>