• John Richard
      link
      fedilink
      3010 months ago

      Windows permissions can be tricky… I’ll give them that. A lot of the tools Microsoft provides are not very straightforward.

      However, PowerShell and tools from Sysinternals suite, or open source tools as well, make it a lot easier.

      Managing permissions on Linux, especially if doing the ACL thing, can be complicated too. I’ve really never ran into many permission issues myself. psexec has been helpful too when needing to access things as the SYSTEM user and not get those stupid prompts asking me to change permissions for protected folders.

      • Skull giver
        link
        fedilink
        1810 months ago

        Having used secured SELinux enterprise code, I’ve learned that Linux permissions can be even more complicated than Windows’ when multiple permission models suddenly overlap. There’s an endless supply of special bit flags, security contexts, and sandboxing features that all overlap.

        I’ve run into very complicated Linux permission issues when combining SELinux (properly configured, not just neutered and standby) and system services in some specific configuration. Once you start applying the permission systems that Windows comes with by default in Linux, you get the same problems (or worse ones, as Linux has a multitude of permission systems stacked on top of each other).

        On Windows, I recall one particularly messed up drive from another computer that not even NT_AURHORITY\SYSTEM was allowed to alter the ownership of. Luckily Linux happily stripped out all the permissions for me because Linux can plainly ignores ACL if you’re root and provide the right flags. Probably a terrible way to break ACLs in a managed environment, but this time it was a feature!

        • ericatty
          link
          fedilink
          710 months ago

          Omg, it’s an inside-joke at our company now.

          Anytime something happens on a server that’s been running great for years, like a hard drive going bad or the time one literally caught on fire…

          98% of the time it is selinux that is the reason it is doing weird things after the main fix because selinux changed a setting on the reboot.

          “Have you checked selinux?” is the go to question whenever anything breaks now, even if it’s not a computer.

        • @[email protected]
          link
          fedilink
          410 months ago

          We tend to forget about it these days, but the Unix permissions model was criticized for decades for being overly simplistic. One user having absolute authority, with limited ways to delegate specific authority to other users, is not a good model for multi-user operating systems. At least not in environments with more than a few users.

          A well-configured sudo or SELinux can overcome this, which is one reason we don’t bring it up much anymore. We also changed the whole model, where most people have individual PCs, and developers are often in their own little VM environment on a larger server.