Chapter Introduction 3.2 The UNIX Model of Ownership

Slides:



Advertisements
Similar presentations
Linux Users and Groups Management
Advertisements

Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Passwords in Unix/Linux Systems.
Chapter 2 Accessing Your System and the Common Desktop Environment.
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
Unix Systems Administration 1Y. K. Chang root: the super user 4 The UNIX semigod who can perform privileged tasks: controlling processes, adding devices,
Linux+ Guide to Linux Certification, Second Edition
Linux File Security. What is Permission ? Specifies what right are granting to users to access the resources available in the computer. So that important.
Getting Started with Linux Linux System Administration Permissions.
O.S security Ge Zhang Karlstad University. Outline Why O.S. security is important? Security schemes in Unix/Linux system Security schemes in windows system.
Introduction to Linux Installing Linux User accounts and management Linux’s file system.
Mid 1960 ’ s - Multics - proposed by AT&T, Honeywell, GE & MIT; funded by DARPA Thompson & Ritchie create Unix 1978 to 84 - Bill Joy & Chuck Haley.
Unix System Administration Rootly Powers Chapter 3.
CIS 191 – Lesson 2 System Administration. CIS 191 – Lesson 2 System Architecture Component Architecture –The OS provides the simple components from which.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
Module 4 - File Security. Security Overview File Ownership Access to Files and Dircetories Changing File and Directory Ownership Changing File and Directory.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
CIT 500: IT Fundamentals Users. Topics 1.Identity 2.User Accounts 3./etc/{passwd,shadow} 4.User Commands 5.Passwords 6.Groups 2.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
UNIX System Protection. Unix History Developed by Dennis Ritchie and Ken Thompson at AT&T Bell Labs Adapted some ideas from the Multics project in 1969.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
PacNOG 6: Nadi, Fiji UNIX ™/ /Linux Permissions Hervey Allen Network Startup Resource Center.
Privileges: who can control what Introduction to Unix June 16, 2009 Papeete, French Polynesia Hervey Allen.
Privileges: who can control what Introduction to Unix May 24, 2008 Rabat, Morocco Hervey Allen.
User Management. Adding New Users Computer Center, CS, NCTU 3 ID  User ID, Group ID % id liuyh  uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm)
SCSC 455 Computer Security Chapter 3 User Security.
Chapter 8 File System Security. File Protection Schemes Password-Based Protection Encryption-Based Protection Protection-Based on Access Permission.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw, pw 2.Set an initial password.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Jozef Goetz, expanded by Jozef Goetz, 2008 Credits: Parts of the slides are based on slides created by UNIX textbook authors, Syed M. Sarwar, Robert.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Karlstad University Operating System security Ge Zhang Karlstad University.
Company LOGO Security in Linux PhiHDN - VuongNQ. Contents Introduction 1 Fundamental Concepts 2 Security System Calls in Linux 3 Implementation of Security.
Privileges: who can control what
Linux Basics Part 1 OSU Picture © Greg Keene. Introductions Lance Albertson Greg Lund-Chaix source:
Permissions: who can control what Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA
Choosing A Username and Password
SYSTEM ADMINISTRATION PART I by İlker Korkmaz and Kaya Oğuz
User Management.
Rootly Powers and Controlling Processes
User Management.
User Access and User ID Commands in UNIX
Chapter 8 File Security.
Chapter 3 Rootly Powers.
Chapter 2 User Management
Privileges: who can control what
Overview of Unix Jagdish S. Gangolly School of Business
Linux Users and Groups Management
Unix Access Control Basic CE 2
COP 4343 Unix System Administration
UNIX System Protection
The Unix Environment for Programming (Comp433)
Security and File Permission
OPS235 Lab4: Investigations 5 – 9
The Linux Command Line Chapter 9
User Management.
File system mounting, sharing, protection
The Attack and Defense of Computers
Module 13 System and User Security
Rootly Powers Chapter 3.
Adding New Users.
Preventing Privilege Escalation
Access Control and Audit
Presentation transcript:

Chapter 3 3.1 Introduction 3.2 The UNIX Model of Ownership 3.3 The Superuser 3.4 Choosing a Root Password 3.5 Becoming Root 3.5 Other Important Users

3.1 Introduction DEMIGOD In UNIX the superuser is the only user to have power to perform all priviledged tasks.

3.2 The UNIX Model of Ownership Ownership of Files owner group owner and GIDs, named in /etc/group UIDs in /etc/passwd Ownership of Processes ea process has four numbers associated with it one real UID, one effective UID, one real GID and one effective GID

3.3 The Superuser UID of zero a.k.a. root may perform any valid op on a file or process may execute some system calls may change ownership credentials at will login program

3.4 Choosing a Root Password should not be easily guessed or discovered random sequence of letters, punctuation, & digits case sensitive only first eight characters are significant change password too

3.5 Becoming Root may login as root “su” to root “su username” as root to get to an account must be in “wheel” group sudo: A limited su /etc/sudoers lists people authorized who and what are logged timeout protected

3.6 Other Important Users root is only user with special status some nonhuman logins for special purposes daemon: Owner of Unprivileged Software bin: Owner of System Commands sys: Owner of the Kernel & Memory Images nobody: Owner of Nothing