[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
etc
/
security
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 console.apps
SET
[ DEL ]
📁 console.perms.d
SET
[ DEL ]
📁 limits.d
SET
[ DEL ]
📁 namespace.d
SET
[ DEL ]
📁 pwquality.conf.d
SET
[ DEL ]
📄 access.conf
4,564 B
SET
[ EDIT ]
|
[ DEL ]
📄 acronisagent.conf
5 B
SET
[ EDIT ]
|
[ DEL ]
📄 chroot.conf
82 B
SET
[ EDIT ]
|
[ DEL ]
📄 console.handlers
624 B
SET
[ EDIT ]
|
[ DEL ]
📄 console.perms
939 B
SET
[ EDIT ]
|
[ DEL ]
📄 faillock.conf
2,232 B
SET
[ EDIT ]
|
[ DEL ]
📄 group.conf
3,635 B
SET
[ EDIT ]
|
[ DEL ]
📄 limits.conf
2,422 B
SET
[ EDIT ]
|
[ DEL ]
📄 namespace.conf
1,440 B
SET
[ EDIT ]
|
[ DEL ]
📄 namespace.init
1,971 B
SET
[ EDIT ]
|
[ DEL ]
📄 opasswd
0 B
SET
[ EDIT ]
|
[ DEL ]
📄 pam_env.conf
2,972 B
SET
[ EDIT ]
|
[ DEL ]
📄 pwhistory.conf
517 B
SET
[ EDIT ]
|
[ DEL ]
📄 pwquality.conf
2,674 B
SET
[ EDIT ]
|
[ DEL ]
📄 sepermit.conf
419 B
SET
[ EDIT ]
|
[ DEL ]
📄 time.conf
2,179 B
SET
[ EDIT ]
|
[ DEL ]
📄 user_map.conf
247 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: namespace.init
#!/bin/sh # It receives as arguments: # - $1 polydir path (see WARNING below) # - $2 instance path (see WARNING below) # - $3 flag whether the instance dir was newly created (0 - no, 1 - yes) # - $4 user name # - $5 flag whether the polydir path ($1) is safe (0 - unsafe, 1 -safe) # - $6 flag whether the instance path ($2) is safe (0 - unsafe, 1 - safe) # # WARNING: This script is invoked with full root privileges. Accessing # the polydir ($1) and the instance ($2) directories in this context may be # extremely dangerous as those can be under user control. The flags $5 and $6 # are provided to let you know if all the segments part of the path (except the # last one) are owned by root and are writable by root only. If the path does # not meet these criteria, you expose yourself to possible symlink attacks when # accessing these path. # However, even if the path components are safe, the content of the # directories may still be owned/writable by a user, so care must be taken! # # The following section will copy the contents of /etc/skel if this is a # newly created home directory. # Executes only if the polydir path is safe if [ "$5" = 1 ]; then if [ "$3" = 1 ]; then # This line will fix the labeling on all newly created directories [ -x /sbin/restorecon ] && /sbin/restorecon "$1" user="$4" passwd=$(getent passwd "$user") homedir=$(echo "$passwd" | cut -f6 -d":") if [ "$1" = "$homedir" ]; then gid=$(echo "$passwd" | cut -f4 -d":") cp -rT /etc/skel "$homedir" chown -R "$user":"$gid" "$homedir" mask=$(sed -E -n 's/^UMASK[[:space:]]+([^#[:space:]]+).*/\1/p' /etc/login.defs) mode=$(printf "%o" $((0777 & ~mask))) chmod ${mode:-700} "$homedir" [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir" fi fi fi exit 0