On Mon, Nov 19, 2018 at 09:55:07AM +0100, Christoph Pleger wrote:
> My program calls getpwuid() with the real user id of the calling user
> and then compares this user's name with the name of the one and only
> user who is allowed to continue program execution. Do you think that
> this can
On Fri, Nov 16, 2018 at 02:43:10PM +0100, Christoph Pleger wrote:
> The beginning is that I want to create a user-specific logical volume when a
> user logs in to a service that authenticates its users through pam and that
> does not run as root.
Couldn't you use a pam_scripts ses_open/ses_close
> program calls getpwuid() with the real user id of the calling user
maybe I missed a critical post explaining why it has to be, but that's a job
for a trivial sudo specification line.
I can't think of any reason why sudo is not the answer to your problem, or
frankly isn't always the answer.
Hello,
On 2018-11-19 15:04, matthew patton wrote:
program calls getpwuid() with the real user id of the calling user
maybe I missed a critical post explaining why it has to be, but that's
a job for a trivial sudo specification line.
I can't think of any reason why sudo is not the answer to
Hello,
On 2018-11-19 14:19, Bryn M. Reeves wrote:
On Fri, Nov 16, 2018 at 02:43:10PM +0100, Christoph Pleger wrote:
The beginning is that I want to create a user-specific logical volume
when a
user logs in to a service that authenticates its users through pam and
that
does not run as root.
Hello,
On 2018-11-15 17:39, Christoph Pleger wrote:
Unfortunately - though these UIDs are all set to 0 - lvcreate still
does not work for me. That is, it does work when I call my
setuid-binary as a non-root user from the command line, but it does
not work when I call my setuid-binary from PAM
http://linux-pam.org/Linux-PAM-html/sag-pam_exec.html
I would further assume pam_exec ignores SUID bit on binaries either because of
a bug or deliberately because there is no good reason to ever do that.
___
linux-lvm mailing list
linux-lvm@redhat.com