Linux Security
--
Questions
--
Followers
Top Experts
Such a "workaround" appears to me as a world writable share.
Is there bit more security consious solution.
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
What is broken by /tmp access descriptor set to 755 is
xfs -droppriv
this appear to work
chmod 777 /tmp
xfs -droppriv -daemon
chmod 755 /tmp
Anyone tested this approach or have a different solution. jlevie, could you be more specific and point to the list of applications that will fail if /tmp access mode is set to  755.
Cheers
The standard behaviour on Linux &Â Unix systems is that /tmp will be world writable and programmers depend on that when writing applications and scripts. You could certainly work around the xfs problem by what you show above, but I'm sure that you are going to find lots of other things that will fail or require special treatment if /tmp isn't world writable.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
-- does xfs really need to write into /tmp after the daemon is initialized.
what applications broked by /tmp world readable ( non - writable )
Cheers
Any of the applications that I mentioned above may break if run by a non-root account if /tmp isn't world writable. And as I pointed my list is only a partial list. But it should be enough to illustrate the fact that you don't want to change the permissions on /tmp.
BTW: The correct permissions for /tmp are 1777, not 777.
has to have someplace to create it's Unix socket for other applications to read font data from. And when --droppriv is used for security reasons xfs no longer runs as root, thus it can't create the socket in /tmp if it isn't world writable.
..."
sounds like you are catching up. With the fix I created xfs can, and already is continuing to run as user xfs and keep /tmp directory free from excessive privileges granted to the user everybody.
Is there a case when this fix caused xfs to break after a day / week / month. Developer is working or worked on it out there, and knows exactly what xfs writes into /tmp directory and when ( after daemon process has being initialized ) may be he or she will share his or her knowledge, so I hope and appreciate your help beforehand and will  grant my points.
Cheers

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
And yes, you can have very secure machines with /tmp world writable. Security is not denial of service.
--
Radu-Adrian Feurdean
Brainbench Linux MVP






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
The solution here is simply not to use poorly written applications. Â
Having a directory that anyone can write to is not a risk. Â Having temp files that anyone can *overwrite* would be a different story, as it would create an easy hijack situation. Â
chmod 1777 /tmp
The extra '1' sets the sticky bit, which keeps people from deleting each other's files.
Meanwhile, the big trouble with /tmp, aluded to by Techno_Mage pointed out, is that programs assume they are the _only_ programs that can write in /tmp. Particular issues are:
o Program writes to files in /tmp with well-known/guessable names without (atomically) checking that file is not a symbolic link. Allows attacker to pre-insert links to system files (such as /etc/passwd) causing the system files to get clobbered.
o Program writes to files in /tmp of user's choosing with elevated priveleges (similar to above).
Just my $.02
-Jon

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
that way the /tmp it uses doesn't have to the THE /tmp.
/. just had an article on chroot, worth a quick look.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
the trouble seems to go away, I still though a bit confused and the confusion comes from details. As much as digging into this heap of privilege manipulation seems counterproductive, I am truly eager to learn how exactly failure of xfs occur when privilege on /tmp is restricted to read execute only to non - privileged users. In this case I really need to delve into the workings, without having to learn source myself. So, my point is I am still looking to find help and I would appreciate if anyone knows xfs explain what is going on.
Thanks
And has been mentioned numerous times in this thread there are other things that will break if /tmp isn't world writable.
-- cheers

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
this question is still unsolved and need to be continued.
-- cheers
Page Editor at Experts Exchange in the following areas:
Programming Languages
Java
Game Programming (or Game Development) depending where you check the name :)
Game UI
3D Programming
AI &Physics
Consoles
Game Graphics
DirectX
OpenGL
Mail : venabili AT experts-exchange DOT com






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
-- cheers

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
There is a difference in Page editor and Cleanup Volunteer:)
I am not the PE here.. I am just helping to have the old quetsions closed - see the help page for more details on the process.:) I may add a list of all tyhe areas I clean in but.... it will be quite long I'm afraid
So what more information you need? (as jlevie  asked)
Venabili
Venabili
"
xfs needs write permissions into /tmp directory.
Such a "workaround" appears to me as a world writable share.
Is there bit more security consious solution.
"
then an additional clarification was added for clarification:
"
what is xfs and how it is doing what it needs so that it needs such a privilege
"
There is a number of reasons I asked this question. If you have input into the question, greatly appreciate it.
Regards,
Miron.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
For security reasons xfs must not be run with root privs, but it does need write access to a temp area that is readable by everone. /tmp on a Unix or Linux system is made world writable (with the sticky bit set) to provide a place for any application running as any user to be able to create temp files that won't hold "sensitive data". So, following long standing convention the writers of xfs chose /tmp as the place to hold the temp files needs for the operation of xfs.
As pointed out, a lot of other things presume that /tmp will be world writable and will break if that's not the case. You could not install X, and thus not need to run xfs, but even so you'll find other applications will fail is /tmp isn't work writable.
-- first moot point
For security reasons xfs must not be run with root privs, but it does need write access to a temp area that is readable by everyone.
-- another moot point
/tmp on a Unix or Linux system is made world writable (with the sticky bit set) to provide a place for any application running as any user to be able to create temp files that won't hold "sensitive data"
-- another comment that is partially accurate and superfluous to the matter discussed.
Admin, please remove all comments from jlevie and venabily as immaterial.
If someone knows workings of xfs and would like to provide a good answer, I would like this person to see an accurate question so that a meaningful comment could be accepted as a good answer.
-- cheers
1777 permissions on /tmp is not a "workaround" - they are the correct permissions for a unix system.
is a very interesting issue that deserves its separate overview. But the question is not about this issue.
I think we need to better cooperate here... and sart discussing xfs workings
-- cheers

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
as far as making aducated guess at how to make xfs workings I submit to you that we should wait until an expert with expertise in the subject comes to the forum and looks up the question. Look with your own eyes, I stand free of correction here and the question does need to be addressed.
-- cheers
Linux Security
--
Questions
--
Followers
Top Experts
The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.