Results 1 to 7 of 7

Thread: remove write

  1. #1
    Senior Member registered user
    Join Date
    Nov 2002
    Location
    Long Island, NY, USA
    Posts
    1,256

    remove write

    I have to remove write from my knoppix-installered LAN. My students recently discovered write and are passing notes during class....

    How do I remove it or turn it off. In older version of KNOPPIX it was off and root had to trun it on. BTW, I'm using KNOPPIX 3.9 on these PCs.

    Regards,
    AJG

  2. #2
    Senior Member registered user
    Join Date
    Nov 2002
    Location
    Long Island, NY USA
    Posts
    1,510
    I haven't tested this, but you can make it owned by root user & root group.
    Code:
    ls -l `which write`
    chown root.root `which write`
    Then remove other read, write & execute permissisons.
    Code:
    chmod o-rwx `which write`
    That should do it.

  3. #3
    Senior Member registered user
    Join Date
    Nov 2002
    Location
    Long Island, NY, USA
    Posts
    1,256
    OK, here's what I got:

    Code:
    root@CentauriPrime:~# which write
    /usr/bin/write
    root@CentauriPrime:~# ls -l /usr/bin/write
    lrwxrwxrwx  1 root root 23 May 11 12:54 /usr/bin/write -> /etc/alternatives/write
    root@CentauriPrime:~# ls -l /etc/alternatives/write
    lrwxrwxrwx  1 root root 18 May 11 12:52 /etc/alternatives/write -> /usr/bin/bsd-write
    root@CentauriPrime:~# ls -l /usr/bin/bsd-write
    -rwxr-sr-x  1 root tty 7992 Nov  1  2004 /usr/bin/bsd-write
    root@CentauriPrime:~#
    Wow, look at all those symbolic links! So, root already owns write, do I just limit the permissions on /usr/bin/bsd-write?

    In other words, as root, I don't have to
    Code:
    chown root.root /usr/bin/bsd-write
    but, as root, I do have to
    Code:
    chmod o-rwx /usr/bin/bsd-write
    BTW, as root, isn't this the same as:
    Code:
    chmod 700 /usr/bin/bsd-write
    BTW, what does -rwxr-sr-x mean?

    TIA,
    AJG

  4. #4
    Senior Member registered user
    Join Date
    Nov 2002
    Location
    Long Island, NY USA
    Posts
    1,510
    Quote Originally Posted by A. Jorge Garcia
    In other words, as root, I don't have to
    Code:
    chown root.root /usr/bin/bsd-write
    but, as root, I do have to
    Code:
    chmod o-rwx /usr/bin/bsd-write
    BTW, as root, isn't this the same as:
    Code:
    chmod 700 /usr/bin/bsd-write
    Not really. I intended to use o-rwx so that other (anyone not root) could not even run or copy the write binary. -rwxrwxrwx is 777. So a o-rwx would make it -rwxrwx---. A 700 would make it -rwx------ so that members of root group other than the root user could not access the write binary.


    BTW, what does -rwxr-sr-x mean?
    The set GUID bit.

    http://www.zzee.com/solutions/unix-p..._14_1077830297
    SGID If set, then replaces "x" in the group permissions to "s", if group has execute permissions, or to "S" otherwise. Examples:
    -rwxrws--- both group execute and SGID are set
    -rwxr-S--- SGID is set, but group execute is not set
    http://www.puschitz.com/SecuringLinux.shtml
    SUID/SGID Files

    When the SUID (set user ID) or SGID (set group ID) bits are set on an executable, it executes with the UID or GID of the owner of the executable rather than that of the person executing it. This means that e.g. all executables that have the SUID bit set and are owned by root are executed with the UID of root. A good example is the passwd command that allows ordinary users to update the password field in the /etc/shadow file which is owned by root.

    But SUID/SGID bits can be misused when the SUID/SGID executable has a security hole. Therefore, you might want to search the entire system for SUID/SGID executables and document it. For example, ensure that code developers don't set SUID/SGID bits on their programs if it's not an absolute requirement. Very often you can use workarounds like removing just the executable bit for world/others. However, a better approach is to change the design of the software if possible.

    To search the entire system for SUID or SGID files, you can run the following command:

    find / -path /proc -prune -o -type f -perm +6000 -ls

    The -prune option in this example is used to skip the /proc filesystem.
    http://www.experts-exchange.com/Secu..._21398469.html
    There are times when setuid/setgid is either necessary or useful for a program. E.g. if you want a user to be able to access a CD-Recorder device thru software that has built-in access restrictions; the device needs to be accessed as root, but you don't want to give the user root access. IF the software is specifically designed to be operated setuid root, then this should be safe. sudo is an excellent utility, but some software just needs elevated privileges to function properly, and use of sudo should not be generically required or considered a replacement for setuid/setgid.

    Directories that have the sticky bit set are to assign proper permissions to files automatically. Removing the sticky bit on directories will not improve security. It can be a good idea to remove setuid/setgid bits from programs which you know will not need to be run by non-root users on a server, or where you wish to restrict it to specific users via sudo... this is advantageous to security ONLY on the presumption that there may in fact be security flaws in these programs that could be exploited in the future. The same argument serves for disabling services which are not needed.

  5. #5
    Senior Member registered user
    Join Date
    Nov 2002
    Location
    Long Island, NY, USA
    Posts
    1,256
    Wow, this permissions stuff and all these links are getting complicated!

    OK, so all I have to do, as root, is:

    Code:
    chown root.root /usr/bin/bsd-write
    chmod o-rwx /usr/bin/bsd-write
    right?

    I'm sorry to be so obtuse about this, but this is my school server and I'm not too familiar with the proceedure you suggest, so I'm being extra careful not to muck it all up....

    Thanx,
    AJG

  6. #6
    Senior Member registered user
    Join Date
    Nov 2002
    Location
    Long Island, NY USA
    Posts
    1,510
    I would not do this
    Code:
    chown root.root /usr/bin/bsd-write
    and instead just do this
    Code:
    chmod o-rwx /usr/bin/bsd-write
    Then open up two terminal windows. In each become a student.
    Code:
    su - student1
    su - student2
    Then try to use the write program. If it fails, then obviously there is nothing left to do. If it still works, then perhaps more permissions need to be reduced.

  7. #7
    Senior Member registered user
    Join Date
    Nov 2002
    Location
    Long Island, NY, USA
    Posts
    1,256
    OK, I logged-in to my school sever from home (sick day today) via ssh as root as follows:

    Code:
    root@CentauriPrime:~# chmod o-rwx /usr/bin/bsd-write
    root@CentauriPrime:~# write
    usage: write user [tty]
    and then as me (Mr. G) as follows:

    Code:
    mrg@CentauriPrime:~$ write
    -bash: /usr/bin/write: Permission denied
    so it would seem that we have been successful!

    Thanx again, James, for all your guidance!

    Regards,
    AJG

Similar Threads

  1. Need help scripting apt-get remove
    By MaldiGola in forum Customising & Remastering
    Replies: 3
    Last Post: 08-18-2008, 01:48 PM
  2. Can I remove the sun-java5-bin?
    By dtzxdtzx1 in forum Customising & Remastering
    Replies: 3
    Last Post: 06-20-2007, 08:25 PM
  3. how do i remove....SBM........
    By cpc in forum Hdd Install / Debian / Apt
    Replies: 1
    Last Post: 01-02-2005, 07:05 PM
  4. how to remove a packae without using apt-get remove?
    By DimGR in forum Hdd Install / Debian / Apt
    Replies: 1
    Last Post: 06-09-2004, 05:34 PM
  5. Packages to remove.......
    By reub2000 in forum Customising & Remastering
    Replies: 3
    Last Post: 06-02-2003, 10:18 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  


IBM Power S822 12-Bay Server System Power8 Core 3.42Ghz DVD-Rom Drive 64GB No HD picture

IBM Power S822 12-Bay Server System Power8 Core 3.42Ghz DVD-Rom Drive 64GB No HD

$399.99



IBM SYSTEM x3200 M2 Server - HDD wiped, No OS picture

IBM SYSTEM x3200 M2 Server - HDD wiped, No OS

$75.00



IBM Power 720 POWER7 00E6516 3.6GHz CPU 64GB RAM Server  picture

IBM Power 720 POWER7 00E6516 3.6GHz CPU 64GB RAM Server

$209.98



IBM 7944AC1 System x3550 M3 Server 1*Intel Xeon X5650 2.67GHz 4GB SEE NOTES picture

IBM 7944AC1 System x3550 M3 Server 1*Intel Xeon X5650 2.67GHz 4GB SEE NOTES

$27.25



ibm server z series picture

ibm server z series

$16000.00



IBM Lenovo X3650 M5 2U 8x 2.5” CTO Rack Server – 2x HS, 2x 750W picture

IBM Lenovo X3650 M5 2U 8x 2.5” CTO Rack Server – 2x HS, 2x 750W

$199.00



IBM Power S822 8284-22A 12SFF Power8 3.89GHz 6-Core 64GB RAM No Bezel/HDD Server picture

IBM Power S822 8284-22A 12SFF Power8 3.89GHz 6-Core 64GB RAM No Bezel/HDD Server

$319.99



IBM Intel EXPI9404PTL Pro/1000 PT Quad Port Server Adapter PCI-E 39Y6138 Free SH picture

IBM Intel EXPI9404PTL Pro/1000 PT Quad Port Server Adapter PCI-E 39Y6138 Free SH

$16.99



IBM System X3650 Server M2 2 x Xeon X5570 2.93 Ghz w/128 GB/DVDRW picture

IBM System X3650 Server M2 2 x Xeon X5570 2.93 Ghz w/128 GB/DVDRW

$169.99



IBM 8203 E4A p520 Server 8203-E4A 4.2GHz 2-Core POWER6 32GB RAM / NO HDD USED picture

IBM 8203 E4A p520 Server 8203-E4A 4.2GHz 2-Core POWER6 32GB RAM / NO HDD USED

$99.99