Skip to main content

permissions - How to revert mass ownership change?










I accidentally executed the chown someuser * -R while I was at / on my server.
I thought maybe by issuing chown root * -R would somehow fix it. But it seems that there are some problems.
For example now the DirectAdmin is acting weird when I try to login. It says:





Unable to determine Usertype
user.conf needs to be repaired




Is there any way that I can fix the situation?



Update: I thought maybe of fixing the problem by writing a shell script which checks every file's group and sets the user accordingly, as it is my knowledge that usually all the files have same values for user and group.


Answer



That is unfortunate!



What the latter command you issued did was change the ownership of all files to root. So, any files that were set up as suid (set UID, so that they run with the privileges of their owner) will run with root permissions, and also users will not own their home directories. Be very careful of this. Consider using ls to search for such files, as this could be a serious security issue if your users had any suid shell scripts or whatnot.




You are presented with a difficult situation; you must now determine who should own what files, and manually assign it. In some cases it will be easier to rebuild then do this, especially if you have backups of your configuration (I assume you backed up your data). If you don't, back it all up now, so you have a reference when rebuilding. However, if you don't mind a little inaccuracy, there are a few simple rules:




  • A user should own all the files in their home directory. For each user, chown -R username ~username.

  • A service that changes its own files should typically be owned by the user the web application runs as. While you can configure this, if you are using apache that user is usually called apache. For each such application's webroot, chown -R apache /path/to/webroot.

  • Similarly, files and directories that will be changed by a service (eg. upload directories) should be owned by the user the service runs as. For each of them, chmod -R username /path/to/filesystem/object.

  • SSL private keys belonging to system services should usually be owned by root (and only readable by the owner). Where they are stored differs widely, but in all cases you or your predecessor put them there. Locate them, and chown root somefile.key for each.

  • Applications which have config files on which read permission is restricted to the owner, but read those files after dropping root, must own those files (this sounds like your DirectAdmin user.conf, possibly, if it is what it sounds like). chown username /path/to/file.




Notwithstanding this, you should consider restoring users' home directories from backup, as they may have set all kinds of permissions and have all kinds of things in there. Doing this would help avoid the security risk mentioned in the beginning.



You cannot infer the owner from the group. For instance, files in a user's home directory often have the ownership username:users. Additionally, many files have a particular owner who can edit them, and a particular group who can read and execute them, and no permissions for other users. This would also cause odd behaviour, or simply fail (groups do not need to correspond to users).



Good luck! If you choose to not rebuild, from now until forever, if you find odd errors about a file being corrupt or having incorrect permissions, you will have to check ownership.


Comments

Popular posts from this blog

linux - iDRAC6 Virtual Media native library cannot be loaded

When attempting to mount Virtual Media on a iDRAC6 IP KVM session I get the following error: I'm using Ubuntu 9.04 and: $ javaws -version Java(TM) Web Start 1.6.0_16 $ uname -a Linux aud22419-linux 2.6.28-15-generic #51-Ubuntu SMP Mon Aug 31 13:39:06 UTC 2009 x86_64 GNU/Linux $ firefox -version Mozilla Firefox 3.0.14, Copyright (c) 1998 - 2009 mozilla.org On Windows + IE it (unsurprisingly) works. I've just gotten off the phone with the Dell tech support and I was told it is known to work on Linux + Firefox, albeit Ubuntu is not supported (by Dell, that is). Has anyone out there managed to mount virtual media in the same scenario?

hp proliant - Smart Array P822 with HBA Mode?

We get an HP DL360 G8 with an Smart Array P822 controller. On that controller will come a HP StorageWorks D2700 . Does anybody know, that it is possible to run the Smart Array P822 in HBA mode? I found only information about the P410i, who can run HBA. If this is not supported, what you think about the LSI 9207-8e controller? Will this fit good in that setup? The Hardware we get is used but all original from HP. The StorageWorks has 25 x 900 GB SAS 10K disks. Because the disks are not new I would like to use only 22 for raid6, and the rest for spare (I need to see if the disk count is optimal or not for zfs). It would be nice if I'm not stick to SAS in future. As OS I would like to install debian stretch with zfs 0.71 as file system and software raid. I have see that hp has an page for debian to. I would like to use hba mode because it is recommend, that zfs know at most as possible about the disk, and I'm independent from the raid controller. For us zfs have many benefits,

apache 2.2 - Server Potentially Compromised -- c99madshell

So, low and behold, a legacy site we've been hosting for a client had a version of FCKEditor that allowed someone to upload the dreaded c99madshell exploit onto our web host. I'm not a big security buff -- frankly I'm just a dev currently responsible for S/A duties due to a loss of personnel. Accordingly, I'd love any help you server-faulters could provide in assessing the damage from the exploit. To give you a bit of information: The file was uploaded into a directory within the webroot, "/_img/fck_uploads/File/". The Apache user and group are restricted such that they can't log in and don't have permissions outside of the directory from which we serve sites. All the files had 770 permissions (user rwx, group rwx, other none) -- something I wanted to fix but was told to hold off on as it wasn't "high priority" (hopefully this changes that). So it seems the hackers could've easily executed the script. Now I wasn't able