-
This is my current setup (running on a personal machine with linux):
Yesterday I moved from a SCGI network port to a unix socket file for XMLRPC communication. Originally, admin and www-data did not share a group. To make the socket work, I ended up adding www-data do my admin user's group. I'm wondering: is this a good practice or am I compromising security by doing this? What is the best practice in terms of permissions to the socket file and user group memebership? |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 1 reply
-
Answering my own question here. I learned how to use File Access Control Lists to add permissions to a specific group or user for a specific file. So, after removig www-data from my admin group, I navigated to the rpc socket file path and simply did:
The commands granted read, write, and execute permissions for the |
Beta Was this translation helpful? Give feedback.
-
I am having the same issue/question. What is the solution to this. |
Beta Was this translation helpful? Give feedback.
-
Thanks for your help. Actually the problem was that you cannot change ACL on NFS share. I moved rpc.socket out of the .session directory (which is located on NFS share) to local directory and now it is working fine. |
Beta Was this translation helpful? Give feedback.
Answering my own question here. I learned how to use File Access Control Lists to add permissions to a specific group or user for a specific file.
So, after removig www-data from my admin group, I navigated to the rpc socket file path and simply did:
setfacl -m www-data:rwx rpc.socket
setfacl -m g:www-data:rwx rpc.socket
The commands granted read, write, and execute permissions for the
www-data
user and thewww-data
group to the socket file and nothing else.