Date: Sat, 13 Aug 2005 15:40:47 -0700 From: Garrett Cooper <youshi10@u.washington.edu> To: joda pain <jodapain@gmail.com>, FreeBSD Questions <freebsd-questions@freebsd.org> Subject: Re: no permission for root??? Message-ID: <42FE76EF.40303@u.washington.edu> In-Reply-To: <9332ce490508121615149d76d8@mail.gmail.com> References: <9332ce4905081215117c558e7@mail.gmail.com> <42FD26D0.6070109@u.washington.edu> <9332ce490508121615149d76d8@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
joda pain wrote: >I am so new(3-4 days solid) at this OS. I have tried to find good help >to no pervail. You are the first person to answer a question direct >and not send me to man pages or the handbook? I truly am a lost soul >with this but I refuse to return to Win or Mac OS. If there is >direction from an outside source I would love to recive the help. I >have a good knowlage of window server OS. I have set up a few and >understand there permissions. Could you link me with someone that >will teach me about Unix permissions/shell invocations. > >Thank the gods of cyberspace for your guidence and THANK YOU!!! >Jody W. Payne >On 8/12/05, Garrett Cooper <youshi10@u.washington.edu> wrote: > > >>joda pain wrote: >> >> >> >>>I have ran a fresh install on the same hard drive 3 times. I log into >>>root without any problems. When I try to run simple commands like >>>checking virtual consoles (/etc/ttys) I get a "Permission denied". I >>>don't understand why this is happening. I can't access any admin >>>properties because of permissions. What am I doing wrong??? I'm using >>>vr. 5.4 >>> >>>Example: >>>login: root >>>password: >>> >>>NetwerksBSD# /etc/ttys >>>/etc/ttys: Permission denied >>> >>>There must be someone or some place I can get an answer for this question. >>>Right now i gather all my answers from man pages & FreeBSD Handbook >>>online http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/index.html >>> >>> >>> >>> >> Try vim /etc/ttys or ee /etc/ttys. >> You do realize that /etc/ttys is a flat, non-executable file, >>correct? Are you sure you understand how Unix permissions/shell >>invocations work? I'm sure that someone here would be willing to teach >>you if that's the issue at hand. >>-Garrett >> >> Joda, Here's a really good simple site on what Unix permissions are and I think it would be helpful for you based on what level you are currently at: <http://www.elated.com/tutorials/management/unix/permissions/>. Another thing before you go chmod your /etc/ttys file... (because some programs may complain about incorrect permissions): your terminals are already running in the background. If you have a standard PC keyboard, you can view a lot of your virtual terminals by pressing ALT-F1 through ALT-F6, depending on how you setup your tty screens (and this is the default by the way). Your X :0'th display defaults to ALT-F7. One important thing to note is that in a sense Windows permissions can be related to Unix permissions as follows: Read and execute under Unix are equivalent to read and execute under Windows, except they are mutually exclusive in Linux, meaning I can specify read by itself and just be able to 'read' a text file without 'executing' it in a shell for instance, since many files cannot be executed but can be read. You can also set something to executable but not readable, but that's essentially useless since you need to be able to read something in order to execute it :P... Users and groups are similar in Windows as in Unix. Administrators in Windows is equivalent to the group 'wheel' in Unix; root is the same as the Administrator account; and many other accounts are specialized to each operating system and the programs within each respective OS. However, there is something important to notice about the purpose of each account and their respective permissions in Unix versus Windows. Windows accounts are typically setup for either the purpose of interactive user login or secondary accounts for system administration, ie the Windows SYSTEM account. Unix expands this sort of secondary accounts ideality though, and as you notice when you go through /etc/password in a text editor, there are many other additional user accounts that are contained within the file than in a user list in Windows for instance. The reasoning is that many programs are run using secondary accounts in an attempt to reduce the amount of security risks because the ideology is if everything was owned by root and there was a software bug, the whole system would be accessible and as such would be at risk. Additional groups are created for owning /dev/ nodes. Take /dev/ad0s1 for instance; it is owned by root:disk in an attempt to reduce the possible raw disk access by unwanted groups, users, etc. Similar things are done with other nodes in the /dev/ directory in a similar attempt to increase security. This is a start and by searching on Google with "unix permissions howto" or "unix permissions explanation", you may greater learn about Unix permissions than I detailed with those few simple paragraphs. Shell information/usage is tied greatly into a Unix filesystem philosophy and ideologies as well, so if you get a firm grasp of what's going on with that, getting a grasp of what a Unix shell in general is will follow. -Garrett
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?42FE76EF.40303>