User Management. Adding New Users Computer Center, CS, NCTU 3 ID  User ID, Group ID % id liuyh  uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm)

Slides:



Advertisements
Similar presentations
Unit 5 – User Administration Randy Marchany VA Tech Computing Center.
Advertisements

Linux Users and Groups Management
6. Adding New Users Xiang Sha Cmsc 691x. 6.1 The /etc/passwd File The /etc/passwd File is a list of users recognized by the system. Login name Encrypted.
Race Condition Zutao Zhu 10/09/09. Outline Race Condition –Some functions –File format of /etc/passwd and /etc/shadow –Input Redirection Format-string.
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Passwords in Unix/Linux Systems.
Chapter 3 Rootly Powers. Computer Center, CS, NCTU 2 The Root  Root Root is God, also called super-user. UID is 0  UNIX permits the superuser to perform.
User Account Management WeeSan Lee. Roadmap Add An Account Delete An Account /etc/{passwd,shadow} /etc/group How To Disable An Account? Root Account Q&A.
Linux+ Guide to Linux Certification, Second Edition
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw 2.Set an initial password >passwd.
Linux+ Guide to Linux Certification, Second Edition
Linux System Administration LINUX SYSTEM ADMINISTRATION.
O.S security Ge Zhang Karlstad University. Outline Why O.S. security is important? Security schemes in Unix/Linux system Security schemes in windows system.
Introduction to Linux Installing Linux User accounts and management Linux’s file system.
Help session: Unix basics Keith 9/9/2011. Login in Unix lab  User name: ug0xx Password: ece321 (initial)  The password will not be displayed on the.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Unix System Administration Rootly Powers Chapter 3.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
2/19/2003 Lecture 3 Computer System Administration Lecture 3 Setup (continued)
File Permissions. What are the three categories of users that apply to file permissions? Owner (or user) Group All others (public, world, others)
Linux+ Guide to Linux Certification, Second Edition
Adding New Users User as an entity - username(UID), GID. UID - typically a number for system to identify the user. GID – a number that recognizes a set.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
Unix System Administration Chapter 6 Adding New Users.
Linux+ Guide to Linux Certification, Third Edition
Managing Users Objectives Contents Practicals Summary
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
Users Greg Porter V1.0, 26 Jan 09. What is a user? Users “own” files and directories Permission based on “ownership” Every user has a User ID (UID) 
Linux Security. See who's logged in 1) w (more information) 2) who (less information)
There are three types of users in linux  System users: ?  Super user: ?  Normal users: ?
Managing Users  Each system has two kinds of users:  Superuser (root)  Regular user  Each user has his own username, password, and permissions that.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Managing Users Objectives –to be able to add, modify and remove Unix user accounts Contents –requirements for a user account –configuration files (passwd,
Linux+ Guide to Linux Certification, Third Edition
Linux+ Guide to Linux Certification, Third Edition
Linux Based Networks University of Education Instructor: Muhammad Amer Irshad.
The Saigon CTT Chapter 10 Managing Users. The Saigon CTT  Objectives  Define the requirements for user accounts  Explain group and group accounts 
© 2006 ITT Educational Services Inc. Linux Operating System :: Unit 3 :: Slide 1 Downloading and Installing Software yum pirut Bit Torrent rmp.
ITI-481: Unix Administration Meeting 3 Christopher Uriarte, Instructor Rutgers University Center for Applied Computing Technologies.
SCSC 455 Computer Security Chapter 3 User Security.
Working with users and Groups. 1. Manage users and group 2. Manage ownership, permissions, and quotas.
Linux Use the Command-Line Interface to Administer the System.
1. Edit the password and group files > vipw(8), pw(8) 2. Set an initial password > passwd lwhsu 3. Set quota > edquota [-u] lwhsu 4. Create user home.
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
SUSE Linux Enterprise Desktop Administration Chapter 9 Manage Users, Groups, and Permissions.
Chapter 6 Adding New Users. Computer Center, CS, NCTU 2 Steps to add a new user 1.Edit the password and group files >vipw, pw 2.Set an initial password.
Managing Users CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
Karlstad University Operating System security Ge Zhang Karlstad University.
This slide deck is for LPI Academy instructors to use for lectures for LPI Academy courses. ©Copyright Network Development Group Module 14 Managing.
User Management Lctseng, arr. by pschiu.
User Management.
Chapter 11: Managing Users
User Management.
Chapter 3 Rootly Powers.
Chapter 2 User Management
Linux Users and Groups Management
Adding New Users, Storage, File System
Unix Access Control Basic CE 2
LINUX SYSTEM ADMINISTRATION
User Management lctseng.
User Management.
Chapter Introduction 3.2 The UNIX Model of Ownership
The Attack and Defense of Computers
Module 13 System and User Security
Adding New Users Chapter 6.
Rootly Powers Chapter 3.
Adding New Users.
Chapter 6 Adding New Users
Presentation transcript:

User Management

Adding New Users

Computer Center, CS, NCTU 3 ID  User ID, Group ID % id liuyh  uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm) % id  uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm)  Super user root  uid=0(root) gid=0(wheel) groups=0(wheel),5(operator)  Other Important Users daemon: owner of unprivileged software bin: owner of system commands sys: owner of the kernel and memory images nobody: owner of nothing

Computer Center, CS, NCTU 4 Steps to add a new user 1.Edit the password and group files >vipw, pw 2.Set an initial password >passwd liuyh 3.Set quota >edquota liuyh 4.Create user home directory >mkdir /home/liuyh 5.Copy startup files to user ’ s home (optional) 6.Set the file/directory owner to the user >chown –R liuyh:dcs /home/liuyh

Computer Center, CS, NCTU 5 Step to add a new user – 1. password and group file (1)  /etc/passwd Store user information:  Login name  Encrypted password (* or x)  UID  Default GID  GECOS information –Full name, office, extension, home phone  Home directory  Login shell Each is separated by “:” /etc $ grep liuyh passwd liuyh:*:1002:20:User &:/home/liuyh:/bin/tcsh

Computer Center, CS, NCTU 6 Step to add a new user – 1. password and group file (2)  Encrypted password The encrypted password is stored in shadow file for security reason  /etc/master.passwd(BSD)  /etc/shadow(Linux) /etc $ sudo grep liuyh master.passwd liuyh:$1$4KQcUPbi$/nVs5bPDUXoyLLxw9Yp9D.:1002:20::0:0:User &:/home/liuyh:/bin/tcsh /etc $ grep liuyh passwd liuyh:*:1002:20:User &:/home/liuyh:/bin/tcsh /etc/passwd (BSD) /etc/master.passwd /etc] sudo grep liuyh passwd liuyh:$1$4KQcUPbi$/nVs5bPDUXoyLLxw9Yp9D.:14529:0:99999:7::: /etc/shadow /etc] grep liuyh passwd liuyh:x:1002:20:User &:/home/liuyh:/bin/tcsh /etc/passwd (Linux)

Computer Center, CS, NCTU 7 Step to add a new user – 1. password and group file (3)  Encrypted methods des  Plaintext: at most 8 characters  Cipher: 13 characters long  vFj42r/HzGqXk md5  Plaintext: arbitrary length  Cipher: 34 characters long started with “ $1$ ”  $1$xbFdBaRp$zXSp9e4y32ho0MB9Cu2iV0 blf  Plaintext: arbitrary length  Cipher: 60 characters long started with “ $2a$ ”  $2a$04$jn9vc7dDJOX7V335o3.RoujuK/uoBYDg1xZs1OcBOrIXve3d1Cbm6  login.conf(5), “AUTHENTICATION” section: passwd_format

Computer Center, CS, NCTU 8 Step to add a new user – 1. password and group file (4)  GECOS General Electric Comprehensive Operating System Commonly used to record personal information “,” separated “finger” command will use it Use “chfn” to change your GECOS #Changing user information for liuyh. Shell: /bin/tcsh Full Name: User & Office Location: Office Phone: Home Phone: Other information: liuyh:*:1002:20:User &:/home/liuyh:/bin/tcsh

Computer Center, CS, NCTU 9 Step to add a new user – 1. password and group file (5)  Login shell Command interpreter  /bin/sh  /bin/csh  /bin/tcsh  /bin/bash(/usr/ports/shells/bash)  /bin/zsh(/usr/ports/shells/zsh) Use “chsh” to change your shell liuyh:*:1002:20:User &:/home/liuyh:/bin/tcsh #Changing user information for liuyh. Shell: /bin/tcsh Full Name: User & Office Location: Office Phone: Home Phone: Other information:

Computer Center, CS, NCTU 10 Step to add a new user – 1. password and group file (6)  /etc/group Contains the names of UNIX groups and a list of each group’s member:  Group name  Encrypted password  GID  List of members, separated by “, ” Only in wheel group can do “su” command wheel:*:0:root,liuyh daemon:*:1:daemon staff:*:20:

Computer Center, CS, NCTU 11 Step to add a new user – 1. password and group file (7)  In FreeBSD Use “vipw” to edit /etc/master.passwd Three additional fields  Login class –Refer to an entry in the /etc/login.conf –Determine user resource limits and login settings –default  Password change time  Expiration time /etc $ sudo grep liuyh master.passwd liuyh:$1$4KQcUPbi$/nVs5bPDUXoyLLxw9Yp9D.:1002:20::0:0:User &:/home/liuyh:/bin/tcsh /etc $ grep liuyh passwd liuyh:*:1002:20:User &:/home/liuyh:/bin/tcsh

Computer Center, CS, NCTU 12 Step to add a new user – 1. password and group file (8)  /etc/login.conf of FreeBSD Set account-related parameters including  Resource limits –Process size, number of open files  Session accounting limits –When logins are allowed, and for how long  Default environment variable  Default path  Location of the message of the day file  Host and tty-based access control  Default umask  Account controls –Minimum password length, password aging login.conf(5)

Computer Center, CS, NCTU 13 Step to add a new user – 1. password and group file (9) default:\ :passwd_format=md5:\ :copyright=/etc/COPYRIGHT:\ :welcome=/etc/motd:\ :setenv=MAIL=/var/mail/$,BLOCKSIZE=K,FTP_PASSIVE_MODE=YES:\ :path=/sbin /bin /usr/sbin /usr/bin /usr/games /usr/local/sbin /usr/local/bin:\ :nologin=/var/run/nologin:\ :cputime=unlimited:\ :datasize=unlimited:\ :stacksize=unlimited:\ :memorylocked=unlimited:\ :memoryuse=unlimited:\ :filesize=unlimited:\ :coredumpsize=unlimited:\ :openfiles=unlimited:\ :maxproc=unlimited:\ :sbsize=unlimited:\ :vmemoryuse=unlimited:\ :priority=0:\ :umask=022:

Computer Center, CS, NCTU 14 Step to add a new user – 1. password and group file (10)  In Linux Edit /etc/passwd and then Use “pwconv” to transfer into /etc/shadow  Fields of /etc/shadow Login name Encrypted password Date of last password change Minimum number of days between password changes Maximum number of days between password changes Number of days in advance to warn users about password expiration Number of inactive days before account expiration Account expiration date Flags /etc] sudo grep liuyh passwd liuyh:$1$4KQcUPbi$/nVs5bPDUXoyLLxw9Yp9D.:14529:0:99999:7:::

Computer Center, CS, NCTU 15 Step to add a new user – 2, 3, 4  Initialize password passwd liuyh  Set quota edquota liuyh edquota –p dcsq liuyh  Home directory mkdir /home/liuyh Quotas for user liuyh: /raid: kbytes in use: , limits (soft = , hard = ) inodes in use: 9728, limits (soft = 50000, hard = 60000)

Computer Center, CS, NCTU 16 Step to add a new user – 5, 6  Startup files System wide  /etc/{csh.cshrc, csh.login, csh.logout, profile} Private  csh/tcsh .login,.logout,.tcshrc,.cshrc  sh .profile  vi .exrc  startx .xinitrc In this step, we usually copy private startup files  /usr/share/skel/dot.*  /usr/local/share/skel/zh_TW.Big5/dot.*  Change onwer chown –R liuyh:dcs /home/liuyh

Computer Center, CS, NCTU 17 Remove accounts  Delete the account entry [FreeBSD] vipw, pw userdel [Linux] remove the row in /etc/passwd and pwconv  Backup file and mailbox tar jcf liuyh-home tar.bz /home/liuyh tar jcf liuyh-mail tar.bz /var/mail/liuyh chmod 600 liuyh-* tar.bz  Delete home directory rm –rf /home/liuyh rm –f /var/mail/liuyh

Computer Center, CS, NCTU 18 Disabling login  Ways to disable login Change user’s login shell as /sbin/nologin Put a “#” in front of the account entry Put a '-' in front of the account entry Put a “*” in the encrypted password field Add *LOCKED* at the beginning of the excrypted password field  pw lock/unlock Write a program to show the reason and how to remove the restriction pw(8)

Rootly Powers

Computer Center, CS, NCTU 20 The Root  Root Root is God, also called super-user. UID is 0  UNIX permits the superuser to perform any valid operation on any file or process, such as: Changing the root directory of a process with chroot Setting the system clock Raising anyone’s resource usage limits and process priorities (renice, edquota) Setting the system’s hostname (hostname command) Configuring network interfaces (ifconfig command) Shutting down the system (shutdown command) …

Computer Center, CS, NCTU 21 Becoming root (1)  Login as root Console login  Allow root login on console.  If you don’t want to permit root login in the console (in /etc/ttys) ttyv1 "/usr/libexec/getty Pc" cons25 on secure  ttyv1 "/usr/libexec/getty Pc" cons25 on insecure Remote login (login via ssh)  sshd: /etc/ssh/sshd_config #PermitRootLogin yes  DON’T DO THAT !!!

Computer Center, CS, NCTU 22 Becoming root (2)  su : substitute user identity su, su -, su username ※ Environment is unmodified with the exception of USER, HOME, SHELL which will be changed to target user. ※ “su -” will simulate as a full login.  sudo : a limited su (security/sudo) Subdivide superuser’s power  Who can execute what command on which host as whom. Each command executed through sudo will be logged Edit /usr/local/etc/sudoers using visudo command  visudo can check mutual exclusive access of sudoers file Sep 20 02:10:08 NASA sudo: liuyh : TTY=pts/1 ; PWD=/tmp ; USER=root ; COMMAND=/etc/rc.d/pf start

Computer Center, CS, NCTU 23 Becoming root (3) sudoers format  Who can execute what command on which host as whom –The user to whom the line applies –The hosts on which the line should be noted –The commands that the specified users may run –The users as whom they may be executed  Use absolute path Host_AliasBSD=bsd1,bsd2,alumni Host_AliasLINUX=linux1,linux2 Cmnd_AliasDUMP=/usr/sbin/dump, /usr/sbin/restore Cmnd_AliasPRINT=/usr/bin/lpc, /usr/bin/lprm Cmnd_AliasSHELLS=/bin/sh, /bin/tcsh, /bin/csh

Computer Center, CS, NCTU 24 Becoming root (4) Host_AliasBSD=bsd1,bsd2,alumni Host_AliasLINUX=linux1,linux2 Cmnd_AliasPRINT=/usr/bin/lpc, /usr/bin/lprm Cmnd_AliasSHELLS=/bin/sh, /bin/tcsh, /bin/csh Cmnd_AliasSU=/usr/bin/su User_AliaswwwTA=jnlin, ystseng User_AliasprintTA=thchen, jnlin Runas_AliasNOBODY=nobody liuyhALL=ALL chiahungALL=(ALL)ALL,!SHELL,!SU printTAcsduty=PRINT wwwTABSD=(NOBODY)/usr/bin/more %wheelALL=NOPASSWD:/sbin/shutdown

Computer Center, CS, NCTU 25 Becoming root (5) % sudo –u nobody more /usr/local/etc/apache/httpd.conf % cp –p /bin/csh /tmp/csh; sudo /tmp/csh

Computer Center, CS, NCTU 26 sudoers Example  liuyhALL=(ALL) ALL  %wheelALL=(ALL) NOPASSWD: ALL

Computer Center, CS, NCTU 27 Advantage of sudo  Accountability is much improved because of command logging  Operators can do chores without unlimited root privileges  The real root password can be known to only one or two people  It ’ s faster to use sudo than to run su or login as root  Privileges can be revoked without the need to change the root password  A canonical list of all users with root privileges is maintained  There is less chance of a root shell being left unattended  A single file can be used to control access for an entire network