3-4linux User Rights detailed

Source: Internet
Author: User

Permissions:r,w,x

files:R, readable ,w can be edited or deleted , X, executable, run command to kernel at command prompt

directory:r can perform LS on this directory to list all directories. W, can create files in this directory , x available CD switch directory,ls-l View file Details

User: identifier UID, stored in /etc/passwd

User Groups : User's container, associated permissions. Logical concept. GID, deposited in /etc/group

Shadow Password:

Users:/etc/shadow

user group:/etc/gshadow

User Category:

admin:0

Normal users:1-65536

system users:1-499

General users:500-60000

User Group Category :

Administrators group:

Normal Group:

System Group:

General Group:

Private Group: If a user is created without a group specified for the user, a group with the same name as the user name is automatically created for it.

Basic group: User Default group.

Additional groups: Additional groups, groups other than the default group.

Example: User Tom executes the LS command, andtheLS command is located in /bin/lswith permissions of rwx r-x r-x Root Root

TOMWhether you can runlsto seetonWhether it is the owner of the document, whether it belongs to the group of documents, this example does not belong to, thatTomcan only be performed with general user rightsls,General user rights areR-x,readable executable, soTOMcan runlscommand. After runninglsto become a process, the Access file for this process is no longer a filelspermissions, but the initiatorTOMthe permissions. The ability of this process to access a file depends on whether the generic group of the process is coincident with the owner of the file being accessed. All of this is called the security context.

#:cat/etc/passwd

The file is divided into 7 fields per field meaning:

account user name:password password:uid user ID number:GID Basic group ID:comment user comment information is generally empty:home DIR home directory: Shell: User's default Shell

#:Cat/etc/shadow

account username : encrypted password: record Password change time from 1970 Year: Minimum password age, typically 0 : Password Maximum Age: Password Expires: Number of days after password expires: Password never Expires: The reserved field is meaningless.

Encryption method:

Symmetric encryption: Encrypt and decrypt the same password.

Public Key cryptography: each password appears in pairs, one for the private key and one for the public key. Private key encryption public key decryption, public key encryption private key decryption. Basic infrastructure for the implementation of e-commerce. Public key cryptography has high security and slow speed.

Single encryption, hash encryption: The ciphertext is obtained by the plaintext, extracting the data signature.

1, Avalanche effect , Butterfly Effect: The initial effect of small changes, resulting in a huge change in structure.

2, fixed-length output

MD5: The output of the fixed length

SHA1: fixed-length output

# Cat/etc/group

all the information for the user group is stored in the/etc/group file. The format of this file is separated by a colon (:) Several fields, these fields are as follows:

Group name : password : Group identification number : List of users in the group

User management:useradd ,userdel, usermod ,passwd , Chsh , Chfn,finger,id,chage

Group Management:GROUPADD,GROUPDEL,GROUPMOD,GPASSWD

Rights Management:Chown,chgrp,chmod,ummask


3-4linux User Rights detailed

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.