Quellcode |
|
1 2 |
~ # su su: Berechtigung verweigert |
Dieser Beitrag wurde bereits 1 mal editiert, zuletzt von »tux-fan« (26.01.2015, 15:25)
Quellcode |
|
1 2 3 4 5 6 |
/dev/sda2 /boot ext4 noauto,noatime 0 0 /dev/sda3 none swap sw 0 0 /dev/sda5 / btrfs noatime,compress=lzo,autodefrag 0 0 /dev/sda6 /home ext4 noatime 0 0 /home/distfiles /usr/portage/distfiles auto rbind 0 0 shm /dev/shm tmpfs nodev,nosuid,noexec 0 0 |
Quellcode |
|
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
mount | grep noexec proc on /proc type proc (rw,nosuid,nodev,noexec,relatime) tmpfs on /dev/shm type tmpfs (rw,nosuid,nodev,noexec) sysfs on /sys type sysfs (rw,nosuid,nodev,noexec,relatime) securityfs on /sys/kernel/security type securityfs (rw,nosuid,nodev,noexec,relatime) tmpfs on /sys/fs/cgroup type tmpfs (ro,nosuid,nodev,noexec,mode=755) cgroup on /sys/fs/cgroup/systemd type cgroup (rw,nosuid,nodev,noexec,relatime,xattr,release_agent=/usr/lib/systemd/systemd-cgroups-agent,name=systemd) pstore on /sys/fs/pstore type pstore (rw,nosuid,nodev,noexec,relatime) cgroup on /sys/fs/cgroup/cpu,cpuacct type cgroup (rw,nosuid,nodev,noexec,relatime,cpu,cpuacct,release_agent=/usr/lib/ulatencyd/ulatencyd_cleanup.lua) cgroup on /sys/fs/cgroup/memory type cgroup (rw,nosuid,nodev,noexec,relatime,memory,release_agent=/usr/lib/ulatencyd/ulatencyd_cleanup.lua) cgroup on /sys/fs/cgroup/hugetlb type cgroup (rw,nosuid,nodev,noexec,relatime,hugetlb) cgroup on /sys/fs/cgroup/blkio type cgroup (rw,nosuid,nodev,noexec,relatime,blkio,release_agent=/usr/lib/ulatencyd/ulatencyd_cleanup.lua) cgroup on /sys/fs/cgroup/perf_event type cgroup (rw,nosuid,nodev,noexec,relatime,perf_event) cgroup on /sys/fs/cgroup/cpuset type cgroup (rw,nosuid,nodev,noexec,relatime,cpuset,release_agent=/usr/lib/ulatencyd/ulatencyd_cleanup.lua) cgroup on /sys/fs/cgroup/devices type cgroup (rw,nosuid,nodev,noexec,relatime,devices) cgroup on /sys/fs/cgroup/freezer type cgroup (rw,nosuid,nodev,noexec,relatime,freezer) |
Quellcode |
|
1 2 3 4 5 6 7 8 9 10 |
dyle@graendal 14:47 ~ $ ls -l $(which su) -rws--x--x 1 root root 155359 Jun 22 2014 /bin/su dyle@graendal 14:47 ~ $ eix -e $(qfile -C --quiet $(which su)) [I] sys-apps/shadow Available versions: 4.1.5.1-r1 (~)4.2.1 {acl audit cracklib nls pam selinux skey xattr} Installed versions: 4.2.1(02:32:14 PM 06/22/2014)(acl cracklib nls pam -audit -selinux -skey -xattr) Homepage: http://shadow.pld.org.pl/ http://pkg-shadow.alioth.debian.org/ Description: Utilities to deal with user accounts |
Quellcode |
|
1 |
$ journalctl -f |
Quellcode |
|
1 2 3 4 5 6 7 |
Jan 26 15:12:35 tuxvaio su[19165]: PAM _pam_load_conf_file: unable to open /etc/pam.d/sudo Jan 26 15:12:35 tuxvaio su[19165]: Successful su for root by root Jan 26 15:12:35 tuxvaio su[19165]: + /dev/tty3 root:root Jan 26 15:12:35 tuxvaio su[19165]: pam_unix(su:session): session opened for user root by root(uid=0) Jan 26 15:12:35 tuxvaio su[19165]: pam_open_session: Permission denied |