• courval@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      14 days ago

      How dare you using a 21st century terminal editor that keeps you sane? You’re supposed to learn a whole new set of archaic key bindings! And suffer!

  • hddsx@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    15 days ago

    Sorry, user babe is not in the sudoers file. This incident will be reported

  • bitchkat@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    14 days ago

    Had an idiot “fix” a permission problem by running “sudo chmod -R 777 /”

    And that is why sudo privileges were removed for the vast majority of people.

    • MTK@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      14 days ago

      seems reasonable to me, root is just a made up concept and the human owns the machine.

    • bigbuckalex@lemmy.zip
      link
      fedilink
      arrow-up
      0
      ·
      14 days ago

      Oh… That sounds like a nightmare. How do you even fix that? There’s no “revert the entire filesystem’s permissions to default” button that I’m aware of

      • bitchkat@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        14 days ago

        I think they had to reinstall. It was part of a Hadoop cluster and that was extra finicky.

      • justme@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        0
        ·
        14 days ago

        If you are lucky your system is atomic or has other roll back feature. Otherwise it’s reinstall time.

        I guess you could set up a fresh system, run a script that goes through each folder checking the permission and setting it on the target system.

    • mlg@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      14 days ago

      Shared this before, but someone I know did a chmod on /bin which nuked all the SUID/GUID bits which borked the system lol.

      Surpsingly easy enough to undo by getting a list of the correct perms from a working system, but hilarious nonetheless

  • xia@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    14 days ago

    Getting flashbacks of me trying to explain to a mac user why using sudo “to make it work” is why he had a growing problem of needing to use sudo… (more and more files owned by root in his home folder).

    • InnerScientist@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      14 days ago

      Sounds like a problem fixing itself, at some point MacOS is going to have problems if it can’t edit a config is my guess.

  • Sixty@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    14 days ago

    sudo dolphin

    Then I act like a Windows user and go there via the GUI because I didn’t feel like learning how to use nano.

    • bishbosh@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      14 days ago

      If you’re running dolphin as sudo and open like a text file in an editor, does it edit the file with sudo?

      • tal@lemmy.today
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        14 days ago

        When you run a process under sudo, it will be running as the root user. Processes that that process launches will also be running as the root user; new processes run as the same user as their parent process.

        So internally, no, it won’t result in another invocation of sudo. But those processes a dolphin process running as root starts will be running as the root user, same as if you had individually invoked them via sudo.

      • TipRing@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        13 days ago

        At one of my prior positions they outsourced all the junior engineers to this firm that only had windows desktop support experience.

        Actual escalation I got:

        contractor: I am trying to remove this file that is filling the drive but it won’t let me

        me: show me what you are doing.

        contractor (screenshot): # rm -f /dev/hdc

        another one did rm -rf /var to clear a stuck log file, which at least did solve the problem he was having.

        After that I sent out an email stating that I would not help anyone who used he rm command unless they consulted with a senior first. I was later reprimanded for saying I wouldn’t help people.

        • B-TR3E@feddit.org
          link
          fedilink
          arrow-up
          0
          ·
          13 days ago

          I was later reprimanded for saying I wouldn’t help people.

          I’ve heard that before. “No. I won’t close the circuit breaker while you’re holding the wires.” “Boss!..”

      • bitchkat@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        14 days ago

        Back in the olden days we used to nfs mount every other machines file system on every machine. I was root and ran “rm -rf /" instead of "./”.

        After I realized that it was taking too long, i realized my error.

        Now for the fun part. In those days nfs passed root privileges to the remote file system. I took out 2.5 machines before I killed it.

        • baines@lemmy.cafe
          link
          fedilink
          English
          arrow-up
          0
          ·
          14 days ago

          I did this in a cleanup script in a make file with an undefined path that turned the pointed dir to root after a hardware change

          thank rngesus I was in a user account with limited privileges

        • B-TR3E@feddit.org
          link
          fedilink
          arrow-up
          0
          ·
          14 days ago

          Back in the olden days we used to nfs mount every other machines file system on every machine. I was root and ran “rm -rf /” instead of “./”.

          I still do. With NFS4 even more than ever. Won’t let it go unless for a SAN.

          Now for the fun part. In those days nfs passed root privileges to the remote file system.

          no_root_squash
          

          much?

            • B-TR3E@feddit.org
              link
              fedilink
              arrow-up
              0
              ·
              13 days ago

              Holy smokes. That must have been before 1989 (that’s when RFC1094 was released, explicitely prohibiting to map the root user to UID 0). I thought, I was old…

    • hddsx@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      15 days ago

      You won’t be able to do certain things. Either .ssh or ~ expects certain exact permissions and pukes if it’s different, IIRC

      • Cethin@lemmy.zip
        link
        fedilink
        English
        arrow-up
        0
        ·
        14 days ago

        Yep. I fucked up once when I meant to type chmod for something but with “./” but I missed the “.”. It was not good.

  • aesthelete@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    14 days ago

    This is definitely the way for configuration files that you shouldn’t change permissions or ownership on but only want to modify a few times.

    However, I find chmod easier to use without reference by using the ugoa (+/-) rwxXst syntax rather than the numbers.

  • GreenKnight23@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    15 days ago

    why tho?

    If it’s a file I have to modify once why would I run:

    sudo chmod 774 file.conf

    sudo chown myuser:myuser file.conf

    vi file.conf

    sudo chown root:root file.conf

    sudo chmod 644 file.conf

    instead of:

    sudo vi file.conf

    1000001464

    • Korthrun@lemmy.sdf.org
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      14 days ago

      Inane. Intentionally convoluted, or someone following the absolute worst tutorials without bothering to understand anything about what they’re reading.

      I have questions:

      • Why are your configurations world readable?
      • Why are you setting the executable bit on a .conf file?
      • Why change the files group alongside the owner when you’ve just given the owner rxw and you’re going to set it back?
      • If it was 644 before, why 774?
      • Why even change the mode if you’re going to change the ownership?
      • Why do you want roots vimrc instead of your users
      • Why do you hate sudoedit
      • Why go out of your way to make this appear more convoluted than it actually is?

      Even jokey comments can lead to people copying bad habits if it’s not clear they’re jokes.

      This was a joke right? I was baited by your trolling?

  • SleepyPie@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    15 days ago

    If it’s all my system should I really care about chown and chmod? Is the point that automatic processes with user names like www-data have to make edits, and need permission to do so, and that’s it?

    Newish Linux user btw

    • palordrolap@fedia.io
      link
      fedilink
      arrow-up
      0
      ·
      15 days ago

      In addition to corsicanguppy’s comment, some — often important — programs actually expect the system to be secured in a particular way and will refuse to function if things don’t look right.

      Now, you’d be right to expect that closing down permissions too tightly could break a system, but people have actually broken their systems by setting permissions too openly on the wrong things as well.

      That said, for general, everyday use, those commands don’t need to be used much, and there might even be a way to do what they do from your chosen GUI. Even so, it nice to know they’re there and what they do for those rare occasions when they might be needed.

    • corsicanguppy@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      15 days ago

      Short answer: yes.

      One of the tenets of security is that a user or process should have only enough access to do what it needs, and then no more. So your web server, your user account, to your mail server, should have exactly what they need, and usually that’s been intricately planned by the distro.

      If you subvert it you could be writing files as root that www-data now can’t read or write. This kind of error is sometimes obvious and sometimes very subtle.

      Especially if you’re new to this different access model, tread carefully.

      Great news! If you need it up, many distros are really great at allowing you cm to compare permissions and reset them. The bad news is that maybe you’re not on one of those. But you could be okay.