OXIESEC PANEL
- Current Dir:
/
/
etc
/
security
Server IP: 163.61.188.9
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
04/22/2026 07:37:14 AM
rwxr-xr-x
📄
access.conf
4.46 KB
12/17/2025 06:53:56 PM
rw-r--r--
📄
chroot.conf
82 bytes
12/17/2025 06:53:57 PM
rw-r--r--
📁
console.apps
-
03/04/2026 01:54:34 PM
rwxr-xr-x
📄
console.handlers
624 bytes
12/17/2025 06:53:57 PM
rw-r--r--
📄
console.perms
939 bytes
12/17/2025 06:53:57 PM
rw-r--r--
📁
console.perms.d
-
12/17/2025 06:53:57 PM
rwxr-xr-x
📄
faillock.conf
2.18 KB
12/17/2025 06:53:58 PM
rw-r--r--
📄
group.conf
3.55 KB
12/17/2025 06:53:59 PM
rw-r--r--
📄
limits.conf
2.37 KB
12/17/2025 06:54:00 PM
rw-r--r--
📁
limits.d
-
12/17/2025 06:54:00 PM
rwxr-xr-x
📄
namespace.conf
1.41 KB
12/17/2025 06:54:01 PM
rw-r--r--
📁
namespace.d
-
12/17/2025 06:54:01 PM
rwxr-xr-x
📄
namespace.init
1.92 KB
12/17/2025 06:54:01 PM
rwxr-xr-x
📄
opasswd
0 bytes
12/17/2025 06:54:07 PM
rw-------
📄
pam_env.conf
2.9 KB
12/17/2025 06:53:58 PM
rw-r--r--
📄
pwhistory.conf
517 bytes
12/17/2025 06:54:02 PM
rw-r--r--
📄
sepermit.conf
419 bytes
12/17/2025 06:54:03 PM
rw-r--r--
📄
time.conf
2.13 KB
12/17/2025 06:54:04 PM
rw-r--r--
Editing: namespace.init
Close
#!/bin/sh # It receives as arguments: # - $1 polydir path (see WARNING below) # - $2 instance path (see WARNING below) # - $3 flag whether the instance dir was newly created (0 - no, 1 - yes) # - $4 user name # - $5 flag whether the polydir path ($1) is safe (0 - unsafe, 1 -safe) # - $6 flag whether the instance path ($2) is safe (0 - unsafe, 1 - safe) # # WARNING: This script is invoked with full root privileges. Accessing # the polydir ($1) and the instance ($2) directories in this context may be # extremely dangerous as those can be under user control. The flags $5 and $6 # are provided to let you know if all the segments part of the path (except the # last one) are owned by root and are writable by root only. If the path does # not meet these criteria, you expose yourself to possible symlink attacks when # accessing these path. # However, even if the path components are safe, the content of the # directories may still be owned/writable by a user, so care must be taken! # # The following section will copy the contents of /etc/skel if this is a # newly created home directory. # Executes only if the polydir path is safe if [ "$5" = 1 ]; then if [ "$3" = 1 ]; then # This line will fix the labeling on all newly created directories [ -x /sbin/restorecon ] && /sbin/restorecon "$1" user="$4" passwd=$(getent passwd "$user") homedir=$(echo "$passwd" | cut -f6 -d":") if [ "$1" = "$homedir" ]; then gid=$(echo "$passwd" | cut -f4 -d":") cp -rT /etc/skel "$homedir" chown -R "$user":"$gid" "$homedir" mask=$(sed -E -n 's/^UMASK[[:space:]]+([^#[:space:]]+).*/\1/p' /etc/login.defs) mode=$(printf "%o" $((0777 & ~mask))) chmod ${mode:-700} "$homedir" [ -x /sbin/restorecon ] && /sbin/restorecon -R "$homedir" fi fi fi exit 0