search for: setegid

Displaying 20 results from an estimated 69 matches for "setegid".

Did you mean: getegid
2001 Apr 11
1
$HOME/.shosts and setegid()
...nly accessible "by group permission"; for example in the following (as I guess quite common) case: drwxr-x--- root mygroup 512 Apr 10 12:09 mygroup And my personal homedirectory would now be one level below: /home/mygroup/myhome So my question: is there a particular reason that setegid() and initgroups() are not used? Regards, -Luzian -- University of Zurich, Centre for Computing Services Luzian Scherrer <luzian.scherrer at zi.unizh.ch> Winterthurerstrasse 190, CH-8057 Zurich Tel: +41 1 63 56778 Fax: +41 1 63 54505 Office: Y11-F-76
2012 Jun 25
4
started with dovecot sieve
...web190304.mail.sg3.yahoo.com> Jun 25 20:22:54 rolf14 postfix/qmgr[21172]: 90898E0190: from=<stephanie.otavy at live.com>, size=5291, nrcpt=1 (queue active) Jun 25 20:22:54 rolf14 postfix/smtpd[21674]: disconnect from localhost[127.0.0.1] Jun 25 20:22:54 rolf14 dovecot: lda(rolf): Error: setegid(privileged) failed: Operation not permitted Jun 25 20:22:54 rolf14 dovecot: lda(rolf): Error: sieve: msgid=<1340648569.94073.YahooMailClassic at web190304.mail.sg3.yahoo.com>: failed to store into mailbox 'INBOX': BUG: Unknown internal error Jun 25 20:22:54 rolf14 dovecot: lda(rolf...
2001 Oct 08
2
Porting OpenSSH 2.9.9p2 to Dynix V4.4.4
...%u: %.100s", (u_int) getegid(), strerror(errno)); /* Propagate the privileged uid to all of our uids. */ if (setuid(geteuid()) < 0) debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno)); #endif /* SAVED_IDS_WORK_WITH_SETEUID */ if (setegid(pw->pw_gid) < 0) fatal("setegid %u: %.100s", (u_int) pw->pw_gid, strerror(errno)); if (seteuid(pw->pw_uid) == -1) fatal("seteuid %u: %.100s", (u_int) pw->pw_uid, strerror(errno)); ----...
2001 Apr 25
0
NeXT // Broken _POSIX_SAVED_ID patch
...< 0) + debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno)); + /* Propagate the privileged uid to all of our uids. */ + if (setuid(geteuid()) < 0) + debug("setuid %u: %.100s", (u_int) geteuid(), strerror(errno)); +#endif /* SAVED_IDS_WORK_WITH_SETEUID */ if (setegid(pw->pw_gid) < 0) - fatal("setegid %u: %.100s", (u_int) pw->pw_gid, - strerror(errno)); - if (seteuid(pw->pw_uid) == -1) - fatal("seteuid %u: %.100s", (u_int) pw->pw_uid, - strerror(errno)); + fatal("setegid %u: %.100s", (u_int) pw->p...
2015 Nov 03
2
dovecot-lda can't create /var/mail dotlocks on debian
...allow creation of the dotlock files. >>>> >>>> When I configure postfix to deliver using dovecot-lda, I get logs that >>>> look >>>> like this: >>>> >>>> Nov 3 11:12:20 desmond dovecot: lda(granitemon): Error: >>>> setegid(privileged) failed: Operation not permitted >>>> Nov 3 11:12:20 desmond dovecot: lda(granitemon): msgid=< >>>> 20151103181306.A4B5B5FF32 at desmond.XXXDOMAIN.org>: save failed to INBOX: >>>> BUG: Unknown internal error >>>> >>>> In...
2015 Nov 03
1
dovecot-lda can't create /var/mail dotlocks on debian
Nov 3 12:23:05 desmond dovecot: lda(granitemon): Debug: Effective uid=1003, gid=1003, home=/home/granitemon Nov 3 12:23:05 desmond dovecot: lda(granitemon): Error: setegid(privileged) failed: Operation not permitted so it's running as the normal user, and NOT with the mail group. I'm using exim with LMTP. LMTP is NOT a bad thing, and might make your life easier. It does allow you to add sieve scripting if you want to via pigeonhole. Sorry, I'm at a...
2015 Nov 03
2
dovecot-lda can't create /var/mail dotlocks on debian
...9 clements -rw------- 1 granitemon mail 530 Nov 2 22:07 granitemon I've added mail_privileged_group = mail to allow creation of the dotlock files. When I configure postfix to deliver using dovecot-lda, I get logs that look like this: Nov 3 11:12:20 desmond dovecot: lda(granitemon): Error: setegid(privileged) failed: Operation not permitted Nov 3 11:12:20 desmond dovecot: lda(granitemon): msgid=< 20151103181306.A4B5B5FF32 at desmond.XXXDOMAIN.org>: save failed to INBOX: BUG: Unknown internal error In order to isolate the error, I took postfix out of the equation, and called dovecot-l...
2001 Apr 04
2
[follow-up/fix] openssh 2.5.2p2 not allowing RSA authentication
the stat() on which file? On Wed, Apr 04, 2001 at 02:06:56PM +0200, Jan Just Keijser wrote: > hmmm, I found the problem and managed to fix it, but I am not sure if this > isn't broken: > > using gdb, I found that sshd fails to stat the 'authorized_keys' files, > which was in /local/home/janjust/.ssh/authorized_keys. Here were the > permissions for the directories
2001 Jun 07
0
Patch for systems with no setreuid()
...ndresvport_sa clock fchown fchmod freeaddrinfo futimes gai_strerror getcwd getaddrinfo getgrouplist getnameinfo getrlimit getrusage getttyent getusershell glob inet_aton inet_ntoa inet_ntop innetgr login_getcapbool md5_crypt memmove mkdtemp on_exit openpty realpath rresvport_af setdtablesize setenv setegid seteuid setlogin setproctitle setresgid setreuid setrlimit setsid sigaction sigvec snprintf strerror strlcat strlcpy strmode strsep strtok_r sysconf tcgetpgrp utimes vsnprintf vhangup vis waitpid _getpty __b64_ntop +for ac_func in arc4random atexit b64_ntop bcopy bindresvport_sa clock fchown fchmod...
2015 Nov 03
2
dovecot-lda can't create /var/mail dotlocks on debian
...added >> mail_privileged_group = mail >> to allow creation of the dotlock files. >> >> When I configure postfix to deliver using dovecot-lda, I get logs that >> look >> like this: >> >> Nov 3 11:12:20 desmond dovecot: lda(granitemon): Error: >> setegid(privileged) failed: Operation not permitted >> Nov 3 11:12:20 desmond dovecot: lda(granitemon): msgid=< >> 20151103181306.A4B5B5FF32 at desmond.XXXDOMAIN.org>: save failed to INBOX: >> BUG: Unknown internal error >> >> In order to isolate the error, I took postf...
1999 Oct 05
0
Solution to accessing shares w/ 2.0.5a and openBSD 2.5 (bug in OpenBSD calls or configure script?)
...gs showed an error of unable to set the appropriate GID from smbd/uid.c. (NT gave me the "incorrect user or password" dialog). The function that was failing was set_effective_gid in lib/util_sec.c. In that section there are four possible calls: some UID trapdoor call setresgid setregid setegid Which one is used is determined by #defines in include/config.h. For some reason the configure script set the trapdoor, the setregid, and the setegid (and the corresponding defs for uid calls) to 1 and did not declare only the one for setresgid. I commented the lines for the trapdoor UID def and...
2001 Oct 08
1
Ported OpenSSH 2.9.9p2 to Dynix
...debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno)); --- 85,98 ---- if (setgroups(user_groupslen, user_groups) < 0) fatal("setgroups: %.100s", strerror(errno)); #endif /* !HAVE_CYWIN */ ! #ifdef SAVED_IDS_WORK_WITH_SETEUID ! if (setegid(pw->pw_gid) < 0) ! fatal("setegid %u: %.100s", (u_int) pw->pw_gid, ! strerror(errno)); ! if (seteuid(pw->pw_uid) == -1) ! fatal("seteuid %u: %.100s", (u_int) pw->pw_uid, ! strerror(errno)); ! #e...
2015 Nov 03
0
dovecot-lda can't create /var/mail dotlocks on debian
...05 desmond dovecot: lda(granitemon): Debug: none: root=, index=, indexpvt=, control=, inbox=, alt= Nov 3 12:23:05 desmond dovecot: lda(granitemon): Debug: Destination address: granitemon at desmond.brinckerhoff.org (source: user at hostname) Nov 3 12:23:05 desmond dovecot: lda(granitemon): Error: setegid(privileged) failed: Operation not permitted Nov 3 12:23:05 desmond dovecot: lda(granitemon): msgid=< 20151103202305.88BE05FF39 at desmond.brinckerhoff.org>: save failed to INBOX: BUG: Unknown internal error Nov 3 12:23:05 desmond dovecot: lda(granitemon): Error: setegid(privileged) failed:...
2001 Apr 22
1
relaxing access rights verifications
...aved_egid = 0; #endif /* @@ -59,6 +60,27 @@ #endif /* SAVED_IDS_WORK_WITH_SETEUID */ } +void +temporarily_use_gid(gid_t gid) +{ +#ifdef SAVED_IDS_WORK_WITH_SETEUID + /* Save the current egid. */ + saved_egid = getegid(); + + /* Set the effective gid to the given (unprivileged) gid. */ + if (setegid(gid) == -1) + debug("setegid %u: %.100s", (u_int) gid, strerror(errno)); +#else /* SAVED_IDS_WORK_WITH_SETEUID */ + /* Propagate the privileged gid to all of our gids. */ + if (setgid(getegid()) < 0) + debug("setgid %u: %.100s", (u_int) getegid(), strerror(errno)); + + /* S...
2015 Nov 03
0
dovecot-lda can't create /var/mail dotlocks on debian
...v 2 22:07 granitemon > > I've added > mail_privileged_group = mail > to allow creation of the dotlock files. > > When I configure postfix to deliver using dovecot-lda, I get logs that look > like this: > > Nov 3 11:12:20 desmond dovecot: lda(granitemon): Error: > setegid(privileged) failed: Operation not permitted > Nov 3 11:12:20 desmond dovecot: lda(granitemon): msgid=< > 20151103181306.A4B5B5FF32 at desmond.XXXDOMAIN.org>: save failed to INBOX: > BUG: Unknown internal error > > In order to isolate the error, I took postfix out of the equati...
2015 Nov 03
0
dovecot-lda can't create /var/mail dotlocks on debian
...roup = mail >>> to allow creation of the dotlock files. >>> >>> When I configure postfix to deliver using dovecot-lda, I get logs that >>> look >>> like this: >>> >>> Nov 3 11:12:20 desmond dovecot: lda(granitemon): Error: >>> setegid(privileged) failed: Operation not permitted >>> Nov 3 11:12:20 desmond dovecot: lda(granitemon): msgid=< >>> 20151103181306.A4B5B5FF32 at desmond.XXXDOMAIN.org>: save failed to INBOX: >>> BUG: Unknown internal error >>> >>> In order to isolate the...
2001 May 22
1
[PATCH]: configure.in: Missing check for setvbuf
...ndresvport_sa clock fchown fchmod freeaddrinfo futimes gai_strerror getcwd getaddrinfo getgrouplist getnameinfo getrlimit getrusage getttyent getusershell glob inet_aton inet_ntoa inet_ntop innetgr login_getcapbool md5_crypt memmove mkdtemp on_exit openpty realpath rresvport_af setdtablesize setenv setegid seteuid setlogin setproctitle setresgid setreuid setrlimit setsid sigaction sigvec snprintf strerror strlcat strlcpy strmode strsep strtok_r sysconf tcgetpgrp utimes vsnprintf vhangup vis waitpid _getpty __b64_ntop) +AC_CHECK_FUNCS(arc4random atexit b64_ntop bcopy bindresvport_sa clock fchown fchmo...
2004 Aug 27
2
OpenSSH-3.9p1 permanently_set_uid behavior on Linux
Aloha, I'm curious about the following code at line 203 in uidswap.c: /* Try restoration of GID if changed (test clearing of saved gid) */ if (old_gid != pw->pw_gid && (setgid(old_gid) != -1 || setegid(old_gid) != -1)) fatal("%s: was able to restore old [e]gid", __func__); This causes permanently_set_uid to fail in the following case: $ su Password: ???????? # newgrp bin # ssh remotehost permanently_set_uid: was able to restore old [e]gid # Is this the desired behavior or should th...
2004 Sep 22
1
[PATCH] permanently_set_uid: Don't try restoring gid on Cygwin
...2 @@ permanently_set_uid(struct passwd *pw) fatal("setuid %u: %.100s", (u_int)pw->pw_uid, strerror(errno)); #endif +#ifndef HAVE_CYGWIN /* Try restoration of GID if changed (test clearing of saved gid) */ if (old_gid != pw->pw_gid && (setgid(old_gid) != -1 || setegid(old_gid) != -1)) fatal("%s: was able to restore old [e]gid", __func__); +#endif /* Verify GID drop was successful */ if (getgid() != pw->pw_gid || getegid() != pw->pw_gid) { -- Corinna Vinschen Cygwin Project Co-Leader Red Hat, Inc.
2005 Jan 26
1
Question about a recent change to uidswap.c in the portability snapshot
...er the case where the user is root. The change is "&& pw->pw_uid != 0 &&". /* Try restoration of GID if changed (test clearing of saved gid) */ if (old_gid != pw->pw_gid && pw->pw_uid != 0 && (setgid(old_gid) != -1 || setegid(old_gid) != -1)) fatal("%s: was able to restore old [e]gid", __func__); My question is, should this change also be included in the setuid() call a few lines later? ... /* Try restoration of UID if changed (test clearing of saved uid) */ if (old_uid !=...