Content deleted Content added
Tomasz alias (talk | contribs) GID of files can be set arbitrarily |
Spam - Undid revision 1273468989 by 73.180.167.130 (talk) |
||
(44 intermediate revisions by 16 users not shown) | |||
Line 1:
{{Multiple issues|
{{One source|date=April 2024}}
{{More footnotes needed|date=April 2024}}
}}
'''Unix security''' refers to the means of [[Computer security|securing]] a [[Unix]] or [[Unix-like]] [[operating system]].
==Design concepts==
===Permissions===
{{Main|File system permissions}}
A core security feature in these systems is the [[file system permissions]]. All files in a typical [[Unix filesystem]] have permissions set enabling different access to a file. [[Unix permissions]] permit different users access to a file with different privilege (e.g., reading, writing, execution). Like users, different ''user groups'' have different permissions on a file.
===User groups===
Many Unix implementations add an additional layer of security by requiring that a user be a member of the ''[[Wheel (computing)|wheel]]'' [[Group identifier (Unix)|user privileges group]] in order to access the <code>su</code> command.<ref name=levi>{{cite book|title=UNIX Administration: A Comprehensive Sourcebook for Effective Systems and Network Management |first=Bozidar |last=Levi |publisher=CRC Press |year=2002 |pages=207 |isbn=0-8493-1351-1}}</ref>
===Root access===
[[File:Sudo on Ubuntu.png|thumb|Sudo command on Ubuntu to temporarily assume root privileges]]
Most Unix and Unix-like systems have an account or group which enables a user to exact complete control over the system, often known as a [[Superuser|root]] account. If access to this account is gained by an unwanted user, this results in a complete breach of the system. A root account however is necessary for administrative purposes, and for the above security reasons the root account is ''seldom'' used for day to day purposes (the [[sudo]] program is more commonly used), so usage of the root account can be more closely monitored. {{Citation needed|date=April 2024}}
==User and administrative techniques==
===Passwords===
Selecting
On many UNIX systems, user and password information, if stored locally, can be found in the [[Passwd|<code>/etc/passwd</code>]] and <code>/etc/shadow</code> file pair.
==Software maintenance==
===Patching===
Operating systems, like all software, may contain bugs in need of fixing or may be enhanced with the addition of new features; many UNIX systems come with a package manager for this. Patching the operating system in a secure manner requires that the software come from a trustworthy source and not have been altered since it was packaged. Common methods for verifying that operating system patches have not been altered include the use of the [[digital signature]] of a [[cryptographic hash]], such as
==Viruses and virus scanners==
There are viruses and worms that target Unix-like operating systems. In fact, the first computer worm—the [[Morris worm]]—targeted Unix systems.
There are [[Antivirus software|virus scanners]] for UNIX-like systems, from [[Comparison_of_antivirus_software|multiple vendors]].
==Firewalls==<!-- This section is linked from [[Unix security]] -->
[[Network firewall]] protects systems and networks from network threats which exist on the opposite side of the firewall. Firewalls can block access to strictly internal services, unwanted users and in some cases filter network traffic by content.{{Citation needed|date=April 2024}}
===iptables===
{{Update section|date=January 2014|reason=Iptables is no longer the "current interface"|inaccurate=yes}}
[[iptables]] is the current user interface for interacting with [[Linux]] kernel [[netfilter]] functionality. It replaced [[ipchains]]. Other [[Unix]] like operating systems may provide their own native functionality and other [[open source]] firewall products exist.
==References==
Line 217 ⟶ 52:
{{Wikibooks|UNIX Computing Security}}
{{Wikiversity|Unix security}}
* [http://www.dsm.fordham.edu/~moniot/Classes/InternetWebF00/unix-security/unix-security.html ''The Unix Security Model for web server administration''] {{
* [https://web.archive.org/web/19971211054350/http://www.alw.nih.gov/Security/Docs/network-security.html ''An Architectural Overview of UNIX Network Security''] Robert B. Reinhardt 1993
* [https://web.archive.org/web/20010815023702/http://andercheran.aiind.upv.es/toni/unix/index_en.html Unix security papers]
|