Roles and Users Security Policy Development Primer for Security Enhanced Linux (Module 8)

Size: px
Start display at page:

Download "Roles and Users Security Policy Development Primer for Security Enhanced Linux (Module 8)"

Transcription

1 Roles and Users Security Policy Development Primer for Security Enhanced Linux (Module 8)

2 2 Role-based Access Control Model Traditional RBAC policy assigns privileges and authorizations to roles authorizes users for one or more roles SE Linux RBAC model assigns privileges and authorizations to domain types assigns domain types to roles authorizes user for one or more roles also supports a role hierarchy concept

3 3 Role Identifier in Security Context root:sysadm_r:sysadm_t role identifier Role identifier in every security context For subjects, represents current role For objects, role is typically object_r role unused for objects

4 4 Role Declaration Statement role role_identifier types type_list ; role_identifier: role name separate name space from types convention: end with _r type_list: one or more assigned types `* and `~ may be used attributes may be used multiple types/attributes enclosed in braces `{ } only domain types makes sense Multiple role statements for same identifier allowed role will contain the union of all assigned types this technique is commonly used in sample policy Only assigned types may be in security context with role

5 5 Roles in Domain Transitions user_r:passwd_t write, setattr, (change password) login fork() passwd user_r:user_t execve() r root root bash r-s--x--x root root shadow_t /etc/shadow passwd_exec_t role user_r types passwd_t; type_transition user_t passwd_exec_t : process passwd_t; /usr/bin/passwd allow user_t passwd_exec_t : file { getattr execute };

6 6 Role Allow Statement Syntax allow current_roles new_roles ; may use `*, `~, and sets of roles Allows current role to transition to new roles Of limited use in current policy most roles can transition to others constraints are used to restrict role changes to be discussed

7 7 Other Role Statements Role Dominance Roles can be defined as dominate of other roles can be defined solely this way Roles inherits all the types of roles it dominates example: dominance {role foo_r {role sysadm_r ; role user_r; } } defines foo_r and has it inherit all the types of sysadm_r and user_r Not used in sample policy Role Transition (deprecated) changes role based on current process role and file type syntax: role_transition current_roles types new_role type transition preferred method for changing process privilege newrole program method for user to change role

8 8 User Identity Model Standard Linux user identifiers changed primarily for purposes of privilege change not necessarily because user changed can change arbitrarily by root SE Linux user identity orthogonal to Linux user identifiers ability to change user is controlled by policy Linux and SE Linux need not be same allows for generic user identity where user not important

9 9 User Identifier in Security Context root:sysadm_r:sysadm_t user identifier User identity defines allowed roles for context no user allow or transition rules Unrelated to Linux UIDs Login programs (login, sshd, etc.) determine initial user identity constraints prevent change otherwise

10 10 User Declaration Statement user user_identifier roles role_list ; user_identifier: user identity separate name space from roles, type, and Linux users role_list: one or more assigned roles multiple roles enclosed in braces `{ } Only roles authorized for user identity may be in security context means by which roles are associated with user Examples (see./policy/users) user root { user_r sysadm_r } ; user jane user_r;

11 11 Special User Identifiers system_u user identity for system processes and resources never create a system_u Linux user never remove the system_u identity from policy user_u optional, need not exist if defined, used for all Linux users not defined to policy if not defined, undefined Linux users can t login WARNING: careful if user_u used adding any new user will assume user_u identify do not include if you wish only explicitly defined users

12 12 Determining Context on Login login, sshd, and crond all set security context at login Pre-Oct 2002, two files determined default login context /etc/security/default_context (login, sshd) /etc/security/crond_context (crond) user must have entry for login to succeed context must be valid too Post-Oct 2002, different method method for determining user default context changed $HOME/.default_contexts (user-specific defaults) /etc/security/default_contexts (system defaults) context must still be valid (but a default will also be chosen)

13 13 New Default Contexts login determines valid user context via libsecure test with selinux/libsecure/test/get_user_sids./get_user_sids system_u:system_r:local_login_t root./get_user_sids system_u:system_r:crond_t root Determined via default_contexts file system_r:local_login_t user_r:user_t system_r:sshd_t user_r:user_t system_r:crond_t user_r:user_crond_t system_r:system_crond_t first column identifies login process s partial context second column defines ordered set of default contexts first context allowed for user selected

14 14 Some user management tools passwd utility wrappers spasswd: checks SE Linux user ID before allowing sadminpasswd: allows privileged domain change all suseradd, suserdel, svipw, schfn seuser manages users in policy does not handle defining Linux users to system handle old and new default contexts command line and graphical

15 15 QUESTIONS?

Security Enhanced Linux. Thanks to David Quigley

Security Enhanced Linux. Thanks to David Quigley Security Enhanced Linux Thanks to David Quigley History SELinux Timeline 1985: LOCK (early Type Enforcement) 1990: DTMach / DTOS 1995: Utah Fluke / Flask 1999: 2.2 Linux Kernel (patch) 2000: 2001: 2.4

More information

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li

Fall 2014:: CSE 506:: Section 2 (PhD) Securing Linux. Hyungjoon Koo and Anke Li Securing Linux Hyungjoon Koo and Anke Li Outline Overview Background: necessity & brief history Core concepts LSM (Linux Security Module) Requirements Design SELinux Key elements Security context: identity

More information

Type Enforcement Rules and Macros

Type Enforcement Rules and Macros Type Enforcement Rules and Macros Security Policy Development Primer for Security Enhanced Linux (Module 7) 2 Overview of Type Enforcement Rules Set of policy rules that specify relationships between types

More information

Advanced Systems Security: Security-Enhanced Linux

Advanced Systems Security: Security-Enhanced Linux Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

SE Linux Administration Tutorial

SE Linux Administration Tutorial SE Linux Administration Tutorial Russell Coker , http://www.coker.com.au/ 1 Introduction The aim of this tutorial is an advanced hands-on training in administering NSA Security Enhanced

More information

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné

More information

Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide Basic and advanced configuration of Security-Enhanced Linux (SELinux) Last Updated: 2017-12-22 Red Hat Enterprise Linux 7 SELinux User's

More information

Core Policy Management Infrastructure for SELinux

Core Policy Management Infrastructure for SELinux Core Policy Management Infrastructure for SELinux 2005 SELinux Symposium Karl MacMillan Tresys Technology http://www.tresys.com Core Policy Management Infrastructure Production

More information

Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide Basic and advanced configuration of Security-Enhanced Linux (SELinux) Last Updated: 2018-04-03 Red Hat Enterprise Linux 7 SELinux User's

More information

Though numerous security tools exist for protecting specific services, as well as user

Though numerous security tools exist for protecting specific services, as well as user 17 CHAPTER Security-Enhanced Linux Though numerous security tools exist for protecting specific services, as well as user information and data, no tool has been available for protecting the entire system

More information

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security

Module: Operating System Security. Professor Trent Jaeger. CSE543 - Introduction to Computer and Network Security CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security So, you have built an operating system that enables user-space processes to

More information

Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Last Updated: 2017-10-20 Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Mirek Jahoda Red Hat Customer Content Services mjahoda@redhat.com

More information

SELinux For Mere Mortals

SELinux For Mere Mortals SELinux For Mere Mortals (Or, Don't Turn It Off ) Dan Walsh Principal Software Engineer, Red Hat Thomas Cameron, RHCA Managing Solutions Architect, Red Hat June 23rd, 2010 Agenda About Us What is SELinux?

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Security Group Meeting 29 November 2002 Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ Computer Laboratory, University of Cambridge Copyright c Steven. J. Murdoch p.1 Summary

More information

Red Hat Enterprise Linux 6 Security-Enhanced Linux. User Guide

Red Hat Enterprise Linux 6 Security-Enhanced Linux. User Guide Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Security-Enhanced Linux Red Hat Enterprise Linux 6 Security-Enhanced Linux User Guide Edition 2.0 Author Copyright 2010 Red Hat, Inc. The text

More information

Meeting Critical Security Objectives with Security-Enhanced Linux

Meeting Critical Security Objectives with Security-Enhanced Linux Meeting Critical Security Objectives with Security-Enhanced Linux Peter A. Loscocco Information Assurance Research Group National Security Agency Co-author: Stephen D. Smalley, NAI Labs Information Assurance

More information

Access Control for Enterprise Apps. Dominic Duggan Stevens Ins8tute of Technology Based on material by Lars Olson and Ross Anderson

Access Control for Enterprise Apps. Dominic Duggan Stevens Ins8tute of Technology Based on material by Lars Olson and Ross Anderson Access Control for Enterprise Apps Dominic Duggan Stevens Ins8tute of Technology Based on material by Lars Olson and Ross Anderson SQL ACCESS CONTROL 2 App vs Database Security Mul8ple users for Apps (A)

More information

Constraints and Security Context Specifications

Constraints and Security Context Specifications Constraints and Security Context Specifications Security Policy Development Primer for Security Enhanced Linux (Module 9) 2 Constrain Statement Additional policy restrictions (i.e. constraints) stated

More information

SE Linux Implementation LINUX20

SE Linux Implementation LINUX20 SE Linux Implementation LINUX20 Russell Coker IBM eserver pseries, Linux, Grid Computing and Storage Technical University 7/7/2004 Licensed under the GPL Topic Objectives In this topic students will learn

More information

CIS 5373 Systems Security

CIS 5373 Systems Security CIS 5373 Systems Security Topic 3.2: OS Security Access Control Endadul Hoque Slide Acknowledgment Contents are based on slides from Ninghui Li (Purdue), John Mitchell (Stanford), Bogdan Carbunar (FIU)

More information

Fedora 11 Security-Enhanced Linux

Fedora 11 Security-Enhanced Linux Fedora 11 Security-Enhanced Linux User Guide Murray McAllister Daniel Walsh Dominick Grift Eric Paris James Morris Scott Radvan Security-Enhanced Linux Fedora 11 Security-Enhanced Linux User Guide Edition

More information

Data Security and Privacy. Unix Discretionary Access Control

Data Security and Privacy. Unix Discretionary Access Control Data Security and Privacy Unix Discretionary Access Control 1 Readings for This Lecture Wikipedia Filesystem Permissions Other readings UNIX File and Directory Permissions and Modes http://www.hccfl.edu/pollock/aunix1/filepermissions.htm

More information

MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX)

MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX) OPERATING SYSTEM SECURITY GUEST LECTURE MANDATORY ACCESS CONTROL SECURITY ENHANCED LINUX (SELINUX) PATRICK UITERWIJK PUITERWIJK@REDHAT.COM / PATRICK.UITERWIJK.ORG GPG KEY: 4096R/0X9AB51E50 0 MANDATORY

More information

Fedora 21 SELinux User's and Administrator's Guide

Fedora 21 SELinux User's and Administrator's Guide Fedora 21 SELinux User's and Administrator's Guide Basic and advanced configuration of Security-Enhanced Linux (SELinux) Barbora Ančincová Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric

More information

Fedora 12 Security-Enhanced Linux

Fedora 12 Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric Paris James Morris Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Edition

More information

Advanced Systems Security: Security-Enhanced Linux

Advanced Systems Security: Security-Enhanced Linux Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises

More information

Jackson State University Department of Computer Science CSC / Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan

Jackson State University Department of Computer Science CSC / Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 2: Running Secure Shell (SSH) Server in a Virtual

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 s Security Basics & Unix Access Control 1 Readings for This Lecture Wikipedia CPU modes System call Filesystem Permissions Other readings UNIX File and Directory Permissions

More information

Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide. Basic and advanced configuration of Security-Enhanced Linux (SELinux)

Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide. Basic and advanced configuration of Security-Enhanced Linux (SELinux) Red Hat Enterprise Linux 7 SELinux User's and Administrator's Guide Basic and advanced configuration of Security-Enhanced Linux (SELinux) Tomáš Čapek Barbora Ančincová Red Hat Enterprise Linux 7 SELinux

More information

Access Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger.

Access Control. CMPSC Spring 2012 Introduction Computer and Network Security Professor Jaeger. Access Control CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Access Control Describe the permissions available to computing processes

More information

VISUDO(8) System Manager s Manual VISUDO(8)

VISUDO(8) System Manager s Manual VISUDO(8) NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file

More information

Race Condition Vulnerability Lab

Race Condition Vulnerability Lab Concordia Institute for Information Systems Engineering - INSE 6130 1 Race Condition Vulnerability Lab Copyright c 2006-2012 Wenliang Du, Syracuse University. The development of this document is funded

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

Editing and Configuring Policies

Editing and Configuring Policies Editing and Configuring Policies Security Policy Development Primer for Security Enhanced Linux (Module 13) 2 Changing a Policy Many ways to change/write a policy Much easier to modify the base policy

More information

Privilege Separation

Privilege Separation What (ideas of Provos, Friedl, Honeyman) A generic approach to limit the scope of programming bugs Basic principle: reduce the amount of code that runs with special privilege without affecting or limiting

More information

CTEC1863/2018F Bonus Lab Page 1 of 5

CTEC1863/2018F Bonus Lab Page 1 of 5 CTEC1863/2018F Bonus Lab Page 1 of 5 Bonus Lab: OpenSUSE Linux Rescue In this lab, we will install an OpenSUSE virtual machine. However, both the non-root user and the root passwords are unknown. To fix

More information

Organizational Units. What Is an OU? OU Hierarchies

Organizational Units. What Is an OU? OU Hierarchies What Is an OU?, page 1 OU Hierarchies, page 1 Cisco Root OU, page 2 Facility OU, page 3 Instance OU, page 3 Security Groups, page 4 What Is an OU? An OU is a container in the AD domain that can contain

More information

VISUDO(8) System Manager s Manual VISUDO(8)

VISUDO(8) System Manager s Manual VISUDO(8) NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file

More information

CPSC 457 OPERATING SYSTEMS MIDTERM EXAM SOLUTION

CPSC 457 OPERATING SYSTEMS MIDTERM EXAM SOLUTION CPSC 457 OPERATING SYSTEMS MIDTERM EXAM SOLUTION Department of Computer Science University of Calgary Professor: Carey Williamson October 29, 2008 This is a CLOSED BOOK exam. Textbooks, notes, laptops,

More information

Oracle Advanced Security: Enterprise User Management. An Oracle Technical White Paper November 1999

Oracle Advanced Security: Enterprise User Management. An Oracle Technical White Paper November 1999 Advanced Security: Enterprise User Management An Technical White Paper Advanced Security: Enterprise User Management THE CHALLENGES OF USER MANAGEMENT Some of the challenges faced by an enterprise today

More information

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03.

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03. Laboratory Exercises: ===================== Complete the following laboratory exercises. All steps are numbered but not every step includes a question. You only need to record answers for those steps that

More information

Oracle 1Z Oracle Solaris 11 System Administration.

Oracle 1Z Oracle Solaris 11 System Administration. Oracle 1Z0-821 Oracle Solaris 11 System Administration http://killexams.com/pass4sure/exam-detail/1z0-821 QUESTION: 238 You have a ZFS file system named /dbase/oral and you want to guarantee that 10 GB

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 13: Operating System Security Department of Computer Science and Engineering University at Buffalo 1 Review Previous topics access control authentication session

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security UNIX Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Genesis: UNIX vs. MULTICS MULTICS (Multiplexed Information and Computing Service) a high-availability,

More information

PREVENTING ZERO-DAYS WITH SELinux:

PREVENTING ZERO-DAYS WITH SELinux: PREVENTING ZERO-DAYS WITH SELinux: How to Stay One Step Ahead of Malicious Software Attacks JOE MacDONALD, CHIEF ARCHITECT MENTOR EMBEDDED LINUX E M B E D D E D S Y S T E M S W H I T E P A P E R w w w.

More information

Systems Programming/ C and UNIX

Systems Programming/ C and UNIX Systems Programming/ C and UNIX Alice E. Fischer Lecture 6: Processes October 9, 2017 Alice E. FischerLecture 6: Processes Lecture 5: Processes... 1/26 October 9, 2017 1 / 26 Outline 1 Processes 2 Process

More information

System Programming. Unix Shells

System Programming. Unix Shells Content : Unix shells by Dr. A. Habed School of Computer Science University of Windsor adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction 2 Interactive and non-interactive

More information

UNIT 10 Ubuntu Security

UNIT 10 Ubuntu Security AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account

More information

Working with Mediator Framework

Working with Mediator Framework CHAPTER 2 This chapter describes the Mediator framework and includes the following sections: Framework Overview, page 2-1 Configurable Nodes, page 2-2 Composite Nodes, page 2-4 Getting and Setting Node

More information

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users

More information

RASS Framework for a Cluster-Aware SELinux

RASS Framework for a Cluster-Aware SELinux RASS Framework for a Cluster-Aware SELinux Arpan Darivemula 1, Chokchai Leangsuksun 1, Anand Tikotekar 1 Makan Pourzandi 2 Louisiana Tech University 1 Open Systems Lab, Ericsson Research Canada 2 apd005@latech.edu

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

The need for setuid style functionality in SELinux environments

The need for setuid style functionality in SELinux environments The need for setuid style functionality in SELinux environments Fernando Vázquez University of Vigo Department of Electronic Technology email: flvazquez@uvigo.es Takashi Horie, Toshiharu Harada NTT DATA

More information

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07

Operating System Security. 0Handouts: Quizzes ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Lesson 1 Quiz 1. What is the working definition of authentication? a. The ability for a person or system to prove identity. b. Protection of data on a system or host from unauthorized access.

More information

H3C License Server. Installation Guide. Hangzhou H3C Technologies Co., Ltd. Document version: 5W

H3C License Server. Installation Guide. Hangzhou H3C Technologies Co., Ltd.   Document version: 5W H3C License Server Installation Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document version: 5W201-20151123 Copyright 2015, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights

More information

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4)

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4) OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4) 1 Agenda: Lab 1 Required materials Thinking Ahead (Tips / Warnings): Importance of Command Line LVM / Host vs Virtual Machines Importance of

More information

Security Enhanced Linux

Security Enhanced Linux Security Enhanced Linux Bengt Nolin beno9295@student.uu.se October 13, 2004 Abstract A very brief introduction to SELinux; what it is, what is does and a little about how it does it. 1 1 Background 1.1

More information

Java Primer 1: Types, Classes and Operators

Java Primer 1: Types, Classes and Operators Java Primer 1 3/18/14 Presentation for use with the textbook Data Structures and Algorithms in Java, 6th edition, by M. T. Goodrich, R. Tamassia, and M. H. Goldwasser, Wiley, 2014 Java Primer 1: Types,

More information

Privileged Remote Access Two-Factor Authentication

Privileged Remote Access Two-Factor Authentication Privileged Remote Access Two-Factor Authentication 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

PESIT Bangalore South Campus

PESIT Bangalore South Campus INTERNAL ASSESSMENT TEST - 2 Date : 20/09/2016 Max Marks : 0 Subject & Code : Unix Shell Programming (15CS36) Section : 3 rd Sem ISE/CSE Name of faculty : Prof Ajoy Time : 11:30am to 1:00pm SOLUTIONS 1

More information

Array Basics: Outline. Creating and Accessing Arrays. Creating and Accessing Arrays. Arrays (Savitch, Chapter 7)

Array Basics: Outline. Creating and Accessing Arrays. Creating and Accessing Arrays. Arrays (Savitch, Chapter 7) Array Basics: Outline Arrays (Savitch, Chapter 7) TOPICS Array Basics Arrays in Classes and Methods Programming with Arrays Searching and Sorting Arrays Multi-Dimensional Arrays Static Variables and Constants

More information

RBAC in Solaris 10. Darren J Moffat Staff Engineer, Networking & Security Sun Microsystems, Inc. 7 th October 2004

RBAC in Solaris 10. Darren J Moffat Staff Engineer, Networking & Security Sun Microsystems, Inc. 7 th October 2004 RBAC in Solaris 10 Darren J Moffat Staff Engineer, Networking & Security Sun Microsystems, Inc. 7 th October 2004 Agenda Least Privilege / RBAC in Solaris 10 SMF - Service Management Framework Zones (N1

More information

2017 Accenture. All Rights Reserved. PWM USER GUIDE

2017 Accenture. All Rights Reserved. PWM USER GUIDE PWM USER GUIDE There are three operations that can be performed through PWM. These are: Operations Change Password Forgot Password First Time User Usage When the user remembers their password but still

More information

ABUSING TEXT EDITORS VIA THIRD-PARTY PLUGINS

ABUSING TEXT EDITORS VIA THIRD-PARTY PLUGINS ABUSING TEXT EDITORS VIA THIRD-PARTY PLUGINS A SafeBreach Labs research by Dor Azouri, Security Researcher, SafeBreach March 2018 1 EXECUTIVE SUMMARY Software third-party extensibility mechanisms have

More information

CIW 1D CIW JavaScript Specialist.

CIW 1D CIW JavaScript Specialist. CIW 1D0-635 CIW JavaScript Specialist http://killexams.com/exam-detail/1d0-635 Answer: A QUESTION: 51 Jane has created a file with commonly used JavaScript functions and saved it as "allfunctions.js" in

More information

CS/CIS 249 SP18 - Intro to Information Security

CS/CIS 249 SP18 - Intro to Information Security Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses

More information

CS615 - Aspects of System Administration. Multiuser Fundamentals

CS615 - Aspects of System Administration. Multiuser Fundamentals CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration Multiuser Fundamentals Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens.edu

More information

Oracle Identity Manager

Oracle Identity Manager Oracle Identity Manager Connector Guide for UNIX Telnet Release 9.0.4 E10448-06 July 2009 Oracle Identity Manager Connector Guide for UNIX Telnet, Release 9.0.4 E10448-06 Copyright 2009, Oracle and/or

More information

Lab Working with Linux Command Line

Lab Working with Linux Command Line Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed

More information

Classes. Logical method to organise data and functions in a same structure. Also known as abstract data type (ADT).

Classes. Logical method to organise data and functions in a same structure. Also known as abstract data type (ADT). UNITII Classes Logical method to organise data and functions in a same structure. Also known as abstract data type (ADT). It s a User Defined Data-type. The Data declared in a Class are called Data- Members

More information

Permissions and Links

Permissions and Links Permissions and Links The root account Setuid and Setgid Permissions Setting Setuid and Setgid with chmod Directory Access Permissions Links o Two Types of Links o The ln command o Removing a link The

More information

UNIX / LINUX - GETTING STARTED

UNIX / LINUX - GETTING STARTED UNIX / LINUX - GETTING STARTED http://www.tutorialspoint.com/unix/unix-getting-started.htm Copyright tutorialspoint.com Advertisements What is Unix? The Unix operating system is a set of programs that

More information

Linux Kung-Fu. James Droste UBNetDef Fall 2016

Linux Kung-Fu. James Droste UBNetDef Fall 2016 Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org

More information

User & Group Administration

User & Group Administration User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process

More information

Run-time Environment

Run-time Environment Run-time Environment Prof. James L. Frankel Harvard University Version of 3:08 PM 20-Apr-2018 Copyright 2018, 2016, 2015 James L. Frankel. All rights reserved. Storage Organization Automatic objects are

More information

OS Security. Authorization. Radboud University Nijmegen, The Netherlands. Winter 2015/2016

OS Security. Authorization. Radboud University Nijmegen, The Netherlands. Winter 2015/2016 OS Security Authorization Radboud University Nijmegen, The Netherlands Winter 2015/2016 A short recap Authentication establishes a mapping between entities (users) and intended operations Typical approach:

More information

The Linux capabilities model

The Linux capabilities model jambit Abendvortrag "Containers unplugged" The Linux capabilities model Michael Kerrisk, man7.org 2019 mtk@man7.org 2 April 2019, Munich Outline 1 Overview 4 2 Process and file capabilities 9 3 Permitted

More information

Chapter 10 Classes Continued. Fundamentals of Java

Chapter 10 Classes Continued. Fundamentals of Java Chapter 10 Classes Continued Objectives Know when it is appropriate to include class (static) variables and methods in a class. Understand the role of Java interfaces in a software system and define an

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online

More information

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96 Advanced Access Control In many cases, identity is a bad criteria for authorization. We examine two modern paradigms for access control, which overcome this limitation: 1. Role-Based Access Control 2.

More information

Start Up and Shutdown Procedures (Unix)

Start Up and Shutdown Procedures (Unix) Start Up and Shutdown Procedures (Unix) Start Up On Main Console 1. Press the Server main power button ON 2. The system will automatically go through the start-up procedures, which will be displayed on

More information

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.

More information

TELE301 Lab16 - The Secure Shell

TELE301 Lab16 - The Secure Shell TELE301 Lab16 - The Secure Shell Department of Telecommunications May 7, 2002 Contents 1 Introduction 2 2 OpenSSH 2 3 Replacing Telnet 2 4 Logging in without a password 2 5 SSH Agent 3 5.1 SSH Add..............................

More information

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version Redhat Basic Operation G U I D E What Need Your www.next-asia.com Readhat Basic Operation Guide, Prepared by Nazmul Khan Page 1 of 43 Redhat Basic Operation Guide RedHat Installation Guide... 2 Installation...

More information

InterWorx Server Administrator SSH Guide. by InterWorx LLC

InterWorx Server Administrator SSH Guide. by InterWorx LLC InterWorx Server Administrator SSH Guide by InterWorx LLC Contents 1 SSH guide 2 1.1 History.................................................. 2 1.2 Shell Users graph.............................................

More information

2. Software Oracle 12c is installed on departmental server machines.

2. Software Oracle 12c is installed on departmental server machines. 1. Introduction This note describes how to access the Oracle database management system on the departmental computer systems. Basic information on the use of SQL*Plus is included. Section 8 tells you how

More information

RBAC: Motivations. Users: Permissions:

RBAC: Motivations. Users: Permissions: Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,

More information

IoT Vulnerabilities. By Troy Mattessich, Raymond Fradella, and Arsh Tavi. Contribution Distribution

IoT Vulnerabilities. By Troy Mattessich, Raymond Fradella, and Arsh Tavi. Contribution Distribution Security Penetration Through IoT Vulnerabilities By Troy Mattessich, Raymond Fradella, and Arsh Tavi Contribution Distribution Arsh Tavi Troy Mattessich Raymond Fradella Conducted research and compiled

More information

EUSurvey OSS OpenCas installation guide (LDAP & SSO)

EUSurvey OSS OpenCas installation guide (LDAP & SSO) EUSurvey OSS 1.3.1 OpenCas installation guide (LDAP & SSO) By default the OSS release has no access to any LDAP structure or to any Single Sign On solution. The only way is to use the internal login system.

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

Using bash. Administrative Shell Scripting COMP2101 Fall 2017

Using bash. Administrative Shell Scripting COMP2101 Fall 2017 Using bash Administrative Shell Scripting COMP2101 Fall 2017 Bash Background Bash was written to replace the Bourne shell The Bourne shell (sh) was not a good candidate for rewrite, so bash was a completely

More information

Fundamentals of Programming. Lecture 12: C Structures, Unions, Bit Manipulations and Enumerations

Fundamentals of Programming. Lecture 12: C Structures, Unions, Bit Manipulations and Enumerations Fundamentals of Programming Lecture 12: C Structures, Unions, Bit Manipulations and Enumerations Instructor: Fatemeh Zamani f_zamani@ce.sharif.edu Sharif University of Technology Computer Engineering Department

More information

Everything about Linux User- and Filemanagement

Everything about Linux User- and Filemanagement Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................

More information

User s Guide February 28, 2017

User s Guide February 28, 2017 User s Guide February 28, 2017 Copyright 2008-2017 Tiger Technology. All rights reserved. This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose. TIGER TECHNOLOGY

More information

Module 4: Access Control

Module 4: Access Control Module 4: Access Control Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University, Jackson, MS 39232 E-mail: natarajan.meghanathan@jsums.edu Access Control In general,

More information

SUDO(8) System Manager s Manual SUDO(8)

SUDO(8) System Manager s Manual SUDO(8) NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p

More information

Webmail Instructions

Webmail Instructions Medway Grid for Learning Policies and Guidance Webmail Instructions (Version 1.10-29/04/2005) Connecting to the webmail service... 1 Accessing old email... 1 To Send a New Message... 3 Organising your

More information

bash startup files Linux/Unix files stty Todd Kelley CST8207 Todd Kelley 1

bash startup files Linux/Unix files stty Todd Kelley CST8207 Todd Kelley 1 bash startup files Linux/Unix files stty Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 midterms (Feb 27 and April 10) bash startup files More Linux Files review stty 2 We customize our

More information

Chapter 8: Security under Linux

Chapter 8: Security under Linux Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system

More information