Ignore:
Timestamp:
10/04/2003 02:23:39 PM (19 years ago)
Author:
Larry Lawrence <larry@…>
Branches:
10.0, 10.1, 11.0, 11.1, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, krejzi/svn, lazarus, nosym, perl-modules, qt5new, systemd-11177, systemd-13485, trunk, upgradedb, v5_0, v5_0-pre1, v5_1, v5_1-pre1, xry111/intltool, xry111/test-20220226
Children:
c2ee009
Parents:
5fd03d2
Message:

compound word edits, a2ps expanded intro

git-svn-id: svn://svn.linuxfromscratch.org/BLFS/trunk/BOOK@1303 af4574ff-66df-0310-9fd7-8a98e5e911e0

File:
1 edited

Legend:

Unmodified
Added
Removed
  • basicnet/netutils/traceroute/traceroute-exp.xml

    r5fd03d2 r5e18c49c  
    88
    99<para><command>make install</command>: Installs <command>traceroute</command>
    10 setuid root in the <filename>/usr/sbin</filename> directory. This makes it
     10with <acronym>UID</acronym> set to root in the <filename>/usr/sbin</filename> directory. This makes it
    1111possible for all users to execute <command>traceroute</command>. For absolute
    12 security, turn off the setuid bit in <command>traceroute</command>'s file
     12security, turn off the <acronym>SUID</acronym> bit in <command>traceroute</command>'s file
    1313permissions with the command:
    1414<screen><command>chmod 0755 /usr/sbin/traceroute</command></screen></para>
     
    1616<para>The risk is that if a security problem such as a buffer overflow were
    1717ever found in the <application>Traceroute</application> code, a regular user
    18 on your system could gain root access if the program is setuid root. Removing
    19 the setuid permission of course also makes it impossible for users other than
     18on your system could gain root access if the program is
     19<acronym>SUID</acronym> root. Removing
     20the <acronym>SUID</acronym> permission of course also makes it impossible for users other than
    2021root to utilize <command>traceroute</command>, so decide what's right for your
    2122individual situation.</para>
    2223
    2324<para>Now, to be completely <acronym>FHS</acronym> compliant, as is our aim, if
    24 you do leave the <command>traceroute</command> binary setuid root, then you
     25you do leave the <command>traceroute</command> binary
     26<acronym>SUID</acronym> root, then you
    2527should move <filename>traceroute</filename> to <filename>/usr/bin</filename>
    2628with the following command:
Note: See TracChangeset for help on using the changeset viewer.