home *** CD-ROM | disk | FTP | other *** search
/ chilidog.highland.cc.ks.us / chilidog.highland.cc.ks.us.zip / chilidog.highland.cc.ks.us / backup / bradford.20120521.etc.tar.gz / bradford.20120521.etc.tar / etc / permissions.secure < prev    next >
Text File  |  2006-04-22  |  24KB  |  474 lines

  1. # /etc/permissions.secure
  2. #
  3. # Copyright (c) 2001 SuSE GmbH Nuernberg, Germany.  All rights reserved.
  4. #
  5. # Author: Roman Drahtmueller <draht@suse.de>, 2001
  6. #
  7. # See /etc/permissions for general hints on how to use this file.
  8. #
  9. # /etc/permissions.secure is designed for the use in a multi-user and
  10. # networked installation. Most privileged file modes are disabled here.
  11. # Many programs that still have their suid- or sgid-modes have had their
  12. # security problems in the past already.
  13. # The primary target of this configuration is to make the basic things
  14. # such as changing passwords, the basic networking programs as well as
  15. # some of the all-day work programs properly function for the unprivileged
  16. # user. The dial-out packages are executable for users belonging to the
  17. # "dialout" group - therefore, these users are to be treated "privileged".
  18. # Packages such as (remote-) batch queueing systems, games, programs for 
  19. # the linux text console, everything linked against OOP libraries and
  20. # most other exotic utilities are turned into unprivileged binary files
  21. # in order for them not to cause any security problems if one or more of
  22. # the programs turn out to have buffer overruns or otherwise locally 
  23. # exploitable programming errors.
  24. # This file is not designed to make your system as closed and as restrictive
  25. # as at all possible. In many cases, restricted access to a configuration 
  26. # file is of no use since the data used can be obtained from the /proc file
  27. # system or interface configuration as well. Also, system programs such as
  28. # /sbin/ifconfig or /sbin/route are not changed because nosey users can
  29. # bring their own. "Security by obscurity" will add any significant 
  30. # security-related advantage to the system. Keep in mind that curiosity
  31. # is a major motivation for your users to try to see behind the curtain.
  32. #
  33. # If you need the functionality of a program that usually runs as a
  34. # privileged user, then use it as root, or, if you are not root, ask your 
  35. # system administrator for advice. In many cases, adding a user to the 
  36. # "trusted" group gives her access to the resources that are not accessible
  37. # any more if the admin chose to select "secure" as the permissions default.
  38. #
  39. # Please make use of the diff program to see the differences between the
  40. # permissions.easy and permissions.secure files if things don't work as
  41. # they should and you suspect a permission or privilege problem.
  42. # The word "easy" is a reference for the /etc/permissions.easy file.
  43. #
  44. # As usual, these settings are "suggested". If you feel so inclined, 
  45. # please feel free to change the modes in this files, but keep a log 
  46. # of your changes for future reference.
  47.  
  48. # Please always keep in mind that your system listens on network sockets
  49. # in the default configuration. Change this by disabling the services that 
  50. # you do not need or by restricting access to them using packet filters
  51. # or tcp wrappers (see hosts_access(5)) to gain a higher level of security
  52. # in your system.
  53.  
  54. #
  55. # Directories
  56. #
  57. # no lock files for emacs:
  58. /var/lib/xemacs/lock                                    root:trusted      1775
  59. # for screen's session sockets:
  60. /var/run/uscreens                                       root:root         1777
  61.  
  62. #
  63. # /etc
  64. #
  65. /etc/crontab                                            root:root          600
  66. /etc/exports                                            root:root          644
  67. /etc/fstab                                              root:root          644
  68. /etc/ftpaccess                                          root:root          644
  69. /etc/ftpusers                                           root:root          644
  70. /etc/inetd.conf                                         root:root          644
  71. /etc/inittab                                            root:root          644
  72. /etc/mtab                                               root:root          644
  73. /etc/rmtab                                              root:root          644
  74. /var/lib/nfs/rmtab                                      root:root          644
  75. /etc/syslog.conf                                        root:root          600
  76.  
  77. #
  78. # suid system programs that need the suid bit to work:
  79. #
  80. /bin/su                                                 root:root         4755
  81. # disable at and cron for users that do not belnong to the group "trusted"
  82. /usr/bin/at                                             root:trusted      4750
  83. /usr/bin/crontab                                        root:trusted      4750
  84. /usr/bin/gpasswd                                        root:shadow       4755
  85. /usr/bin/newgrp                                         root:root         4755
  86. /usr/bin/passwd                                         root:shadow       4755
  87. /usr/bin/chfn                                           root:shadow       4755
  88. /usr/bin/chage                                          root:shadow       4755
  89. /usr/bin/chsh                                           root:shadow       4755
  90. /usr/bin/expiry                                         root:shadow       4755
  91. # the default configuration of the sudo package in SuSE distribution is to
  92. # intimidate users.
  93. /usr/bin/sudo                                           root:root         4755
  94. /usr/sbin/su-wrapper                                    root:root         0755
  95. # opie password system
  96. # #66303
  97. /usr/bin/opiepasswd                                     root:root         4755
  98. /usr/bin/opiesu                                         root:root         4755
  99. # "user" entries in /etc/fstab make mount work for non-root users:
  100. /usr/bin/ncpmount                                       root:trusted      4750
  101. /usr/bin/ncpumount                                      root:trusted      4750
  102. # mount/umount have had their problems already:
  103. /bin/mount                                              root:root         4755
  104. /bin/umount                                             root:root         4755
  105. /bin/eject                                              root:audio        4750
  106. #
  107. # #133657
  108. /usr/bin/fusermount                                     root:trusted      4750
  109. # #66203
  110. /usr/lib/majordomo/wrapper                              root:daemon       4750
  111. # glibc backwards compatibility
  112. /usr/lib/pt_chown                                       root:root         4755
  113. /usr/lib64/pt_chown                                     root:root         4755
  114. /sbin/unix_chkpwd                                       root:shadow       2755
  115. /sbin/unix2_chkpwd                                      root:shadow       2755
  116. # qpopper
  117. /usr/sbin/popauth                                       pop:trusted       4750
  118. # from the squid package
  119. /usr/sbin/pam_auth                                      root:shadow       2755
  120.  
  121. # still to be converted to utempter
  122. /opt/gnome/lib/vte/gnome-pty-helper                     root:tty          2755
  123.  
  124. # gpg cannot pin memory into the ram using mlock(2) if not suid.
  125. # In memory pressure conditions, memory pages containing sensitive information
  126. # can be paged to disk.
  127. # the suid bit also removes gpg's complaints wrt the insecure memory.
  128. /usr/bin/gpg                                            root:root         4755
  129.  
  130.  
  131.  
  132.  
  133. #
  134. # mixed section: most of it is disabled in this permissions.secure:
  135. #
  136. #########################################################################
  137. # rpm subsystem:
  138. /usr/src/packages/SOURCES/                              root:root          755
  139. /usr/src/packages/BUILD/                                root:root          755
  140. /usr/src/packages/RPMS/                                 root:root          755
  141. /usr/src/packages/RPMS/alpha/                           root:root          755
  142. /usr/src/packages/RPMS/alphaev56/                       root:root          755
  143. /usr/src/packages/RPMS/alphaev67/                       root:root          755
  144. /usr/src/packages/RPMS/alphaev6/                        root:root          755
  145. /usr/src/packages/RPMS/arm4l/                           root:root          755
  146. /usr/src/packages/RPMS/athlon/                          root:root          755
  147. /usr/src/packages/RPMS/i386/                            root:root          755
  148. /usr/src/packages/RPMS/i486/                            root:root          755
  149. /usr/src/packages/RPMS/i586/                            root:root          755
  150. /usr/src/packages/RPMS/i686/                            root:root          755
  151. /usr/src/packages/RPMS/ia64/                            root:root          755
  152. /usr/src/packages/RPMS/mips/                            root:root          755
  153. /usr/src/packages/RPMS/ppc/                             root:root          755
  154. /usr/src/packages/RPMS/ppc64/                           root:root          755
  155. /usr/src/packages/RPMS/powerpc/                         root:root          755
  156. /usr/src/packages/RPMS/powerpc64/                       root:root          755
  157. /usr/src/packages/RPMS/s390/                            root:root          755
  158. /usr/src/packages/RPMS/s390x/                           root:root          755
  159. /usr/src/packages/RPMS/sparc/                           root:root          755
  160. /usr/src/packages/RPMS/sparcv9/                         root:root          755
  161. /usr/src/packages/RPMS/sparc64/                         root:root          755
  162. /usr/src/packages/RPMS/x86_64/                          root:root          755
  163. /usr/src/packages/RPMS/armv4l/                          root:root          755
  164. /usr/src/packages/RPMS/hppa/                            root:root          755
  165. /usr/src/packages/RPMS/hppa2.0/                         root:root          755
  166. /usr/src/packages/RPMS/noarch/                          root:root          755
  167. /usr/src/packages/SPECS/                                root:root          755
  168. /usr/src/packages/SRPMS/                                root:root          755
  169. #########################################################################
  170. # video
  171. /usr/X11R6/bin/v4l-conf                                 root:video        4750
  172. /opt/gnome/sbin/zapping_setup_fb                        root:video        4750
  173. # vmware
  174. /usr/bin/vmware                                         root:trusted      4750
  175. /usr/bin/vmware-ping                                    root:trusted      4750
  176. # Itanium ia32 emulator
  177. /usr/lib/ia32el/suid_ia32x_loader                       root:root         0755
  178. # scotty:
  179. # #66211
  180. /usr/bin/ntping                                         root:trusted      4750
  181. # This is not extensively tested.
  182. /usr/bin/vlock                                          root:shadow       0755
  183. /usr/X11R6/bin/Xorg                                     root:root         0711
  184. /usr/bin/man                                            root:root         4755
  185. /usr/bin/mandb                                          root:root         4755
  186. # turned off write and wall by disabling sgid tty:
  187. /usr/bin/wall                                           root:tty          0755
  188. /usr/bin/write                                          root:tty          0755
  189. # thttpd: sgid + executeable only for group www. Useless...
  190. /usr/bin/makeweb                                        root:www          2750
  191. # yaps, pager software, accesses /dev/ttyS? . Disabled sgid uucp.
  192. /usr/bin/yaps                                           root:uucp         0755
  193. # scmxx, tool for mobile phone, accesses /dev/ttyS?
  194. # #66309
  195. /usr/bin/scmxx                                          root:uucp         0755
  196. # ncpfs tool: trusted only
  197. /usr/bin/nwsfind                                        root:trusted      4750
  198. /usr/bin/ncplogin                                       root:trusted      4750
  199. /usr/bin/ncpmap                                         root:trusted      4750
  200. # lpdfilter:
  201. # checks itself that only lp and root can call it
  202. /usr/lib/lpdfilter/bin/runlpr                           root:root         4755
  203. # pcmcia:
  204. # Needs setuid to eject cards (#100120)
  205. /sbin/pccardctl                                         root:trusted      4750
  206. # pcmcia-cardinfo:
  207. # for visual pcmcia status info. Needs setuid for creating device
  208. # files. It does that before initializing X
  209. /usr/X11R6/bin/cardinfo                                 root:root         0755
  210. # gnokii nokia cellphone software
  211. # #66209
  212. /usr/sbin/mgnokiidev                                    root:uucp          755
  213. # pcp, performance co-pilot
  214. # setuid root is used to write /var/log/pcp/NOTICES
  215. # #66205
  216. /usr/lib/pcp/pmpost                                     root:trusted      4750
  217. # mailman mailing list software
  218. # #66315
  219. /usr/lib/mailman/cgi-bin/admin                          root:mailman      2755
  220. /usr/lib/mailman/cgi-bin/admindb                        root:mailman      2755
  221. /usr/lib/mailman/cgi-bin/edithtml                       root:mailman      2755
  222. /usr/lib/mailman/cgi-bin/listinfo                       root:mailman      2755
  223. /usr/lib/mailman/cgi-bin/options                        root:mailman      2755
  224. /usr/lib/mailman/cgi-bin/private                        root:mailman      2755
  225. /usr/lib/mailman/cgi-bin/roster                         root:mailman      2755
  226. /usr/lib/mailman/cgi-bin/subscribe                      root:mailman      2755
  227. /usr/lib/mailman/cgi-bin/confirm                        root:mailman      2755
  228. /usr/lib/mailman/cgi-bin/create                         root:mailman      2755
  229. /usr/lib/mailman/cgi-bin/editarch                       root:mailman      2755
  230. /usr/lib/mailman/cgi-bin/rmlist                         root:mailman      2755
  231. /usr/lib/mailman/mail/mailman                           root:mailman      2755
  232.  
  233. # libgnomesu (#75823)
  234. /opt/gnome/lib/libgnomesu/gnomesu-pam-backend           root:root         0755
  235.  
  236. # control-center2 (#104993)
  237. /opt/gnome/sbin/change-passwd                           root:root         4755
  238.  
  239. #
  240. # cups (#66305)
  241. #
  242. /usr/bin/lppasswd                                       lp:sys            4755
  243.  
  244. #
  245. # networking (need root for the privileged socket)
  246. #
  247. /bin/ping                                               root:root         4755
  248. /bin/ping6                                              root:root         4755
  249. /usr/bin/bing                                           root:trusted      4750
  250. /usr/sbin/traceroute6                                   root:root         4755
  251. # mtr is linked against ncurses. no suid bit, for root only:
  252. /usr/sbin/mtr                                           root:dialout      0755
  253. /usr/bin/rcp                                            root:root         4755
  254. /usr/bin/rlogin                                         root:root         4755
  255. /usr/bin/rsh                                            root:root         4755
  256.  
  257. # OpenPBS #66320
  258. /var/spool/pbs/spool                                    root:root         1777
  259. /var/spool/pbs/undelivered                              root:root         1777
  260. /opt/pbs/sbin/pbs_iff                                   root:root         4755
  261. /opt/pbs/sbin/pbs_rcp                                   root:root         4755
  262.  
  263. # heartbeat #66310
  264. # cl_status needs to be allowed to connect to the heartbeat API. If the setgid
  265. # bit is removed, one can manually add users to the haclient group instead.
  266. /usr/bin/cl_status                                      root:haclient     2555
  267.  
  268. # apache2
  269. /usr/sbin/suexec2                                       root:root         0755
  270.  
  271. # exim
  272. /usr/sbin/exim                                          root:root         4755
  273.  
  274. #
  275. # dialup networking programs
  276. #
  277. /usr/sbin/pppoe-wrapper                                 root:dialout      4750
  278. # i4l package (#100750):
  279. /sbin/isdnctrl                                          root:dialout      4750
  280. # #66111
  281. /usr/bin/vboxbeep                                       root:trusted      0755
  282.  
  283.  
  284. #
  285. # linux text console utilities
  286. # setuid needed on the text console to set the terminal content on ctrl-o
  287. # #66112
  288. /usr/lib/mc/cons.saver                                  root:root         0755
  289.  
  290.  
  291. #
  292. # terminal emulators
  293. # This and future SuSE products have support for the utempter, a small helper
  294. # program that does the utmp/wtmp update work with the necessary rights.
  295. # The use of utempter obsoletes the need for sgid bits on terminal emulator
  296. # binaries. We mention screen here, but all other terminal emulators have
  297. # moved to /etc/permissions, with modes set to 0755.
  298.  
  299. # needs setuid to access /dev/console
  300. # framebuffer terminal emulator (japanese)
  301. /usr/bin/jfbterm                                        root:tty          0755
  302.  
  303. #
  304. # kde
  305. # (all of them are disabled in permissions.secure except for 
  306. # the helper programs)
  307. #
  308. # arts wrapper, normally suid root:
  309. /opt/kde3/bin/artswrapper                               root:root         0755
  310. # needs setuid root when using shadow via NIS:
  311. # #66218
  312. /opt/kde3/bin/kcheckpass                                root:shadow       4755
  313. # do not allow khc_indexbuilder to write into /var/cache/susehelp/
  314. /opt/kde3/bin/khc_indexbuilder                          root:man          0755
  315. # This has a meaning... hmm...
  316. /opt/kde3/bin/kdesud                                    root:nogroup      2755
  317. # used for getting proxy settings from dhcp
  318. /opt/kde3/bin/kpac_dhcp_helper                          root:root         0755
  319. # edits /etc/smb.conf
  320. # #66312
  321. /usr/bin/fileshareset                                   root:root         0755
  322.  
  323. #
  324. # amanda
  325. #
  326. # Well, if you are gid disk already, you don't need these amanda binaries
  327. # to get root.
  328. # Anyway, we don't keep the suid bits.
  329. /usr/sbin/amcheck                                       root:disk         0750
  330. /usr/lib/amanda/calcsize                                root:disk         0750
  331. /usr/lib/amanda/rundump                                 root:disk         0750
  332. /usr/lib/amanda/planner                                 root:disk         0750
  333. /usr/lib/amanda/runtar                                  root:disk         0750
  334. /usr/lib/amanda/dumper                                  root:disk         0750
  335. /usr/lib/amanda/killpgrp                                root:disk         0750
  336.  
  337.  
  338. #
  339. # gnats
  340. #
  341. /usr/lib/gnats/gen-index                                gnats:root        4555
  342. /usr/lib/gnats/pr-edit                                  gnats:root        4555
  343. /usr/lib/gnats/queue-pr                                 gnats:root        4555
  344.  
  345.  
  346. #
  347. # news (inn)
  348. #
  349. # the inn start script changes it's uid to news:news. Later innstart and
  350. # innfeed are called by this user. Those programs do not need to be called by
  351. # anyone else, therefore the strange permissions 4554 are required for
  352. # operation. (#67032)
  353. #
  354. /usr/lib/news/bin/rnews                                 news:uucp         4550
  355. /usr/lib/news/bin/startinnfeed                          root:news         4554
  356. /usr/lib/news/bin/inndstart                             root:news         4554
  357. /usr/lib/news/bin/inews                                 news:news         2555
  358.  
  359.  
  360. #
  361. # fax
  362. #
  363. # restrictive, only for "trusted" group users:
  364. # faxq helper:
  365. /usr/lib/mgetty+sendfax/faxq-helper                     fax:root          4711
  366. /var/spool/fax/outgoing                                 fax:root          0755
  367. /var/spool/fax/outgoing/locks                           fax:root          0755
  368. # TODO: package should set this permissions
  369. /var/spool/fax/archive                                  fax:uucp           700
  370. /var/spool/fax/bin                                      fax:uucp           755
  371. /var/spool/fax/client                                   fax:uucp           755
  372. /var/spool/fax/config                                   fax:uucp           755
  373. /var/spool/fax/dev                                      fax:uucp           755
  374. /var/spool/fax/docq                                     fax:uucp           700
  375. /var/spool/fax/doneq                                    fax:uucp           700
  376. /var/spool/fax/etc                                      fax:uucp           755
  377. /var/spool/fax/info                                     fax:uucp           755
  378. /var/spool/fax/log                                      fax:uucp           755
  379. /var/spool/fax/pollq                                    fax:uucp           700
  380. /var/spool/fax/recvq                                    fax:uucp           755
  381. /var/spool/fax/sendq                                    fax:uucp           700
  382. /var/spool/fax/status                                   fax:uucp           755
  383. /var/spool/fax/tmp                                      fax:uucp           700
  384.  
  385. #
  386. # uucp
  387. #
  388. /var/spool/uucppublic                                   root:uucp         1770
  389. /usr/bin/uucp                                           uucp:uucp         6555
  390. /usr/bin/uuname                                         uucp:uucp         6555
  391. /usr/bin/uustat                                         uucp:uucp         6555
  392. /usr/bin/uux                                            uucp:uucp         6555
  393. /usr/lib/uucp/uucico                                    uucp:uucp         6555
  394. /usr/lib/uucp/uuxqt                                     uucp:uucp         6555
  395.  
  396.  
  397. #
  398. # games of all kinds, toys
  399. # all suid and sgid bits cleared.
  400. #
  401.  
  402. # bsd-games
  403. /usr/games/atc                                          games:games       0755
  404. /usr/games/battlestar                                   games:games       0755
  405. /usr/games/canfield                                     games:games       0755
  406. /usr/games/cribbage                                     games:games       0755
  407. /usr/games/phantasia                                    games:games       0755
  408. /usr/games/robots                                       games:games       0755
  409. /usr/games/sail                                         games:games       0755
  410. /usr/games/snake                                        games:games       0755
  411. /usr/games/tetris-bsd                                   games:games       0755
  412.  
  413. # Maelstrom
  414. /usr/games/Maelstrom                                    games:games       0755
  415.  
  416. # pachi
  417. /usr/games/pachi                                        games:games       0755
  418. /usr/games/martian                                      games:games       0755
  419.  
  420. # nethack
  421. /usr/lib/nethack/nethack.tty                            games:games       0755
  422.  
  423. # chromium,
  424. /usr/games/chromium                                     games:games       0755
  425.  
  426. # geki2
  427. /usr/games/geki2                                        games:games       0755
  428. /usr/games/grande                                       games:games       0755
  429.  
  430. # xscrabble
  431. /usr/games/xscrab                                       games:games       0755
  432.  
  433. # trackballs
  434. /usr/games/trackballs                                   games:games       0755
  435.  
  436. # ltris
  437. /usr/games/ltris                                        games:games       0755
  438.  
  439. # xlogical
  440. /usr/games/xlogical                                     games:games       0755
  441.  
  442. # lbreakout
  443. /usr/games/lbreakout2                                   games:games       0755
  444.  
  445. # xgalaga
  446. /usr/X11R6/bin/xgalaga                                  games:games       0755
  447.  
  448. # xtetris
  449. /usr/X11R6/bin/xtetris                                  games:games       0755
  450.  
  451. # xmris
  452. /usr/X11R6/bin/xmris                                    games:games       0755
  453.  
  454. # rocksndiamonds
  455. /usr/games/rocksndiamonds                               games:games       0755
  456.  
  457. # gnome-games
  458. /opt/gnome/bin/gtali                                    games:games       0755
  459. /opt/gnome/bin/gnotski                                  games:games       0755
  460. /opt/gnome/bin/gnome-stones                             games:games       0755
  461. /opt/gnome/bin/glines                                   games:games       0755
  462. /opt/gnome/bin/gnibbles                                 games:games       0755
  463. /opt/gnome/bin/gnotravex                                games:games       0755
  464. /opt/gnome/bin/mahjongg                                 games:games       0755
  465. /opt/gnome/bin/gnometris                                games:games       0755
  466. /opt/gnome/bin/gnobots2                                 games:games       0755
  467. /opt/gnome/bin/gnomine                                  games:games       0755
  468. /opt/gnome/bin/same-gnome                               games:games       0755
  469.  
  470. # Novell nici. See bug 127545
  471. /var/opt/novell/nici/nicimud                            root:root         4755
  472.