Solved

linux ACL question

Posted on 2011-03-09
7
321 Views
Last Modified: 2012-05-11
I have created a file called lab2 and gave access to userID mark, but after su to mark, I  don't have permission to write contents on lab2 file. What am I missing here?

 getfacl lab2
# file: lab2
# owner: ghuru
# group: ghuru
user::rw-
user:mark:rw-
group::rw-
mask::rw-
other::r--
0
Comment
Question by:mokkan
  • 3
  • 3
7 Comments
 
LVL 31

Accepted Solution

by:
farzanj earned 375 total points
ID: 35089985
Show me

ls -l lab2
0
 

Author Comment

by:mokkan
ID: 35090034
[root@localhost ghuru]# ls  -l lab2
-rw-rw-r--+ 2 ghuru ghuru 0 Mar  9 19:03 lab2


Is this file system should mount with ACL option?
0
 
LVL 31

Assisted Solution

by:farzanj
farzanj earned 375 total points
ID: 35090042
Yes, in your fstab, is it mouted with acl in the options?

If not try doing this

mount -o remount,rw,acl -t ext3 /dev/... /mount/pt

Also for now, try doing chmod 777 lab2, just to make sure
0
Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

 

Author Comment

by:mokkan
ID: 35090047
ah ok, thank you. Let me try.
0
 
LVL 1

Assisted Solution

by:cycotr0n
cycotr0n earned 125 total points
ID: 35109701
Just an FYI - Sometimes you don't need the acl option in fstab if it is specified in the filesystem's default mount options.  You can check with dumpe2fs:

# dumpe2fs /dev/sda1 | grep mount
dumpe2fs 1.39 (29-May-2006)
Last mounted on:          <not available>
Default mount options:    user_xattr acl
Last mount time:          Thu Feb  3 09:21:52 2011
Maximum mount count:      -1
0
 
LVL 31

Assisted Solution

by:farzanj
farzanj earned 375 total points
ID: 35109766
Thanks for the info.

So is your issue resolved?  Need any more help?
0
 

Author Closing Comment

by:mokkan
ID: 35241507
Thank you all of you. It worked now.,
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now