<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LVM command in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956968#M631802</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I tried some of the commands on a test system here this morning as a non-root user.  I can do the display commands [vgdisplay, lvdisplay, etc.] but when I tried to do an lvextend it complained, "Must be root to use this command".&lt;BR /&gt;&lt;BR /&gt;It looks like the binaries do check to make sure you are root before you do something dangerous.&lt;BR /&gt;&lt;BR /&gt;JP&lt;BR /&gt;</description>
    <pubDate>Wed, 23 Apr 2003 13:13:24 GMT</pubDate>
    <dc:creator>John Poff</dc:creator>
    <dc:date>2003-04-23T13:13:24Z</dc:date>
    <item>
      <title>LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956960#M631794</link>
      <description>&lt;BR /&gt;I notice that all the lv's , pv's , vg's command such lvlnboot, pvdisplay, vgchange, etc. have its uid and gid set to 4000 and 2000. &lt;BR /&gt;&lt;BR /&gt;This means a non-root users can also executed those commands on lv, pv and vg. &lt;BR /&gt;&lt;BR /&gt;Does this pose a considerable problems in configuration to the system when some non-users just execute it without knowing its impact?&lt;BR /&gt;&lt;BR /&gt;Can I reset those uid and gid for these commands? Will it have any impact on its execution?</description>
      <pubDate>Wed, 23 Apr 2003 01:27:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956960#M631794</guid>
      <dc:creator>YLTan</dc:creator>
      <dc:date>2003-04-23T01:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956961#M631795</link>
      <description>Here are the permissions for all of my lv*, pv* and vg* commands.  They are all owned by root with the group sys.  If yours are different they are definitely NOT RIGHT.  &lt;BR /&gt;&lt;BR /&gt;My next step would be to figure out why they are different.&lt;BR /&gt;&lt;BR /&gt;Good luck.&lt;BR /&gt;&lt;BR /&gt;root@hquas06:/usr/sbin-&amp;gt;ll lv* pv* vg*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 lvchange*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 lvcreate*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 lvdisplay*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 lvextend*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 lvlnboot*&lt;BR /&gt;-r-xr--r--   1 bin        bin         143360 Nov  6  1997 lvmmigrate*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 lvreduce*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 lvremove*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 lvrmboot*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 pvchange*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 pvck*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 pvcreate*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 pvdisplay*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 pvmove*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 pvremove*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgcfgbackup*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgcfgrestore*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgchange*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgchgid*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgcreate*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgdisplay*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgexport*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgextend*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgimport*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgreduce*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgremove*&lt;BR /&gt;-r-sr-xr-x  26 root       sys         540672 Jun 24  2002 vgscan*&lt;BR /&gt;root@hquas06:/usr/sbin-&amp;gt;</description>
      <pubDate>Wed, 23 Apr 2003 01:37:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956961#M631795</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2003-04-23T01:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956962#M631796</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I'm pretty sure that you have to be root to execute those commands.  The commands are probably coded so that they check your UID when you run them and they make sure you are root.&lt;BR /&gt;&lt;BR /&gt;When you say the UID and GID are set to 4000 and 2000, do you mean the ownership of those command file executables?  My guess is that they should probably be root:sys or bin:bin or something along those lines.&lt;BR /&gt;&lt;BR /&gt;JP&lt;BR /&gt;</description>
      <pubDate>Wed, 23 Apr 2003 01:40:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956962#M631796</guid>
      <dc:creator>John Poff</dc:creator>
      <dc:date>2003-04-23T01:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956963#M631797</link>
      <description>You should never allow access to commands like lvlnboot, vgchange and pvcreate. They could terrible damage. The dislay programs are okay to use. The onwership are root:sys</description>
      <pubDate>Wed, 23 Apr 2003 01:47:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956963#M631797</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2003-04-23T01:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956964#M631798</link>
      <description>I just tried an experiment and logged in as a normal user (not root) and I could run /usr/sbin/lvdisplay and /usr/sbin/vgdisplay.  I didn't try any of the others but they MAY work as well.&lt;BR /&gt;&lt;BR /&gt;Now one thing I did have to do is specify the FULL PATH to the commands since /usr/sbin is not normally in a normal users path and it should really never be.  &lt;BR /&gt;&lt;BR /&gt;I don't know if it would hurt to take execute permission off of world for those commands or not.  If you are really paranoid about security it may be something to test out and see how it works.</description>
      <pubDate>Wed, 23 Apr 2003 01:49:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956964#M631798</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2003-04-23T01:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956965#M631799</link>
      <description>In addition, some of these commands have their own in built protection:&lt;BR /&gt;&lt;BR /&gt;e.g. &lt;BR /&gt;$ lvlnboot -v&lt;BR /&gt;Must be root to use this command.&lt;BR /&gt;&lt;BR /&gt;If users must have this type of access, install 'sudo'&lt;BR /&gt;You can get it from here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.6/" target="_blank"&gt;http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.6/&lt;/A&gt;</description>
      <pubDate>Wed, 23 Apr 2003 01:51:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956965#M631799</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2003-04-23T01:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956966#M631800</link>
      <description>With the the same permission and ownership of all the vg*,lv* &amp;amp; pv* commands (like shown by Patrick) in /usr/sbin I can only run these ..&lt;BR /&gt;- vgdisplay&lt;BR /&gt;- lvdisplay&lt;BR /&gt;- pvdisplay&lt;BR /&gt;.. as normal user. The rest of the commands can only be run as root. So you can actually leave the permissions and ownerships unchanged.</description>
      <pubDate>Wed, 23 Apr 2003 02:43:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956966#M631800</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2003-04-23T02:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956967#M631801</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;If you examine the output of Patrick's 'ls' command you will immediately note that the LVM binaries listed have multiple links (in fact, 26 in his listing).  If you would further examine these binaries you can find that *all* of them are actually the *same* binary file.  They are all hard-links to a single piece of code.  Hence, any change in permissions or ownership to one link is reflected in every link.&lt;BR /&gt;&lt;BR /&gt;An easy way to show their commonality is to do:&lt;BR /&gt;&lt;BR /&gt;# ls -il /usr/sbin/lvchange&lt;BR /&gt;&lt;BR /&gt;...note the inode number (e.g. 15042 on one of my systems).  Then look for all files matching this inode:&lt;BR /&gt;&lt;BR /&gt;# ls -il /usr/sbin|grep 15042&lt;BR /&gt;&lt;BR /&gt;...you will thus expose all of the common binaries in Patrick's post.&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Wed, 23 Apr 2003 11:03:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956967#M631801</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2003-04-23T11:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956968#M631802</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;I tried some of the commands on a test system here this morning as a non-root user.  I can do the display commands [vgdisplay, lvdisplay, etc.] but when I tried to do an lvextend it complained, "Must be root to use this command".&lt;BR /&gt;&lt;BR /&gt;It looks like the binaries do check to make sure you are root before you do something dangerous.&lt;BR /&gt;&lt;BR /&gt;JP&lt;BR /&gt;</description>
      <pubDate>Wed, 23 Apr 2003 13:13:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956968#M631802</guid>
      <dc:creator>John Poff</dc:creator>
      <dc:date>2003-04-23T13:13:24Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956969#M631803</link>
      <description>Hi All, &lt;BR /&gt;&lt;BR /&gt;Thanks for all the help. &lt;BR /&gt;&lt;BR /&gt;Why did HP put uid and gid in those commands as defaults installation? It is misleading.</description>
      <pubDate>Sun, 27 Apr 2003 08:53:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956969#M631803</guid>
      <dc:creator>YLTan</dc:creator>
      <dc:date>2003-04-27T08:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: LVM command</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956970#M631804</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Take a look at this doc, it explains the why and what.&lt;BR /&gt;&lt;BR /&gt;Docid: A4318288D&lt;BR /&gt;Mechanism used to prevent regular user from running LVM commands&lt;BR /&gt;&lt;BR /&gt;Europe and Asia&lt;BR /&gt;&lt;A href="http://www4.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;docId=200000062938676" target="_blank"&gt;http://www4.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;docId=200000062938676&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;US&lt;BR /&gt;&lt;A href="http://www2.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;docId=200000062938676" target="_blank"&gt;http://www2.itrc.hp.com/service/cki/docDisplay.do?docLocale=en_US&amp;amp;docId=200000062938676&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope it helps,&lt;BR /&gt;&lt;BR /&gt;Robert-Jan.</description>
      <pubDate>Sun, 27 Apr 2003 10:55:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/lvm-command/m-p/2956970#M631804</guid>
      <dc:creator>Robert-Jan Goossens</dc:creator>
      <dc:date>2003-04-27T10:55:26Z</dc:date>
    </item>
  </channel>
</rss>

