Questions tagged [unix]

Unix is a family of multiuser, multitasking operating system that is widely used in workstations, servers and embedded devices. The best-known Unix variant is Linux.

Unix is a family of multiuser, multitasking operating systems found on many servers, workstations, network equipment and other embedded devices. Unix variants include , , , , and more. Use the tag for questions that are about Unix-like systems in general; if your question is about a specific operating system (Linux, OpenBSD, …), use the tag for that system. For functional questions (“How do I use this tool which is not specifically a security tool?”), try asking on our sister site Unix & Linux.

In the core Unix security model, roles are described in terms of users (who are typically either physical users or system services) and groups. The permissions of an application are those of the user executing it. Some programs run with elevated privileges through the setuid/setgid mechanism.

Resources such as data files, programs and devices are accessed through files. In the traditional Unix model, each file has an owner and group, and the owner, group and others are granted separate permissions (read/write/execute). Many modern Unix systems provide access control lists and other extensions to the basic model.

151 questions
5
votes
3 answers

Can a self-build router minimize the potential risk of intels management engine (ME)?

I read some stuff about intels ME and got interested because of its huge potential security threat to basically (more or less) every intel system since 2008. And I came across the great work of @igor-skochinsky who did a pretty good presentation…
5
votes
2 answers

Best practices for securing a public facing web server?

I'm looking to make a "bare minimum" checklist for securing a public facing Unix web server. Assume it's a LAMP stack (or similar). This list should be what minimums you would implement. Obviously requirements would go up for high traffic sites…
wubs
  • 153
  • 1
  • 5
5
votes
1 answer

Why is `cd` restricted in rbash/restricted bash?

The bash manual says: A restricted shell behaves identically to bash with the exception that the following are disallowed or not performed: Changing directories with the cd builtin. Why is this not allowed? What security holes does this close /…
Michael Thorpe
  • 153
  • 1
  • 5
5
votes
1 answer

Always setgroups before setuid?

On GNU/Linux systems that are build using RPM packages, the rpmlint utility complains about programs that don't call setgroups before setuid. The idea is that before dropping privileges, a process should also drop the list of supplementary group…
Kaz
  • 2,303
  • 16
  • 17
5
votes
2 answers

Can UNIX Domain Sockets be locked by user ID?

If I created a folder /tmp/me with permissions 700, and started a process under me that starts a listen socket under /tmp/me/socket. I currently assume that a connection to that socket originated from a process that is running on the very same…
700 Software
  • 13,807
  • 3
  • 52
  • 82
5
votes
4 answers

Should I compile as root?

When I am compiling software for local installation, what factors should I take into consideration when deciding whether to compile as root or to compile under my regular user account? ./configure make sudo make install or sudo…
joeytwiddle
  • 303
  • 3
  • 10
5
votes
3 answers

Making passwd/shadow files more secure

The passwd/shadow files in a unix-like OS contain sensitive info such as a user's password. In addition those files aren't necessarily secured: with a live CD we can access those files on the hard drive and potentially gain access to the sensitive…
wisdom
  • 457
  • 1
  • 5
  • 8
5
votes
2 answers

What is the entropy of a password made with pwgen?

pwgen is a unix utility that generates "memorable" passwords randomly. The man page says the entropy is lower than truly random passwords with the same specification. What is the actual entropy of a password made with pwgen?
Dan
  • 151
  • 4
4
votes
1 answer

Privileges separation over parent/children processes on UNIX systems?

I was scrolling through a Google Research paper related to privileges separation and I felt lost while reading this : In Unix, every process runs within its own protection domain, i.e., the operating system protects the address space of a…
Shruikan
  • 53
  • 5
4
votes
2 answers

How to remove meta and sensitive data from PDF file?

I've some PDF files generated from different sources (such as web-browser, Photoshop, etc.) on Unix. How do I make sure PDF doesn't contain any sensitive information such as IP address, OS, user name, full name, or whatever could be stored and other…
cicada
  • 43
  • 1
  • 3
4
votes
3 answers

Is `arc4random` secure enough?

I need to generate many many initialization vectors and session keys in C++ code. I am wondering if arc4random is up to the task. Last I heard, there are many weaknesses in the RC4 cipher. Should I stick to reading from /dev/urandom instead? I am…
Siyuan Ren
  • 342
  • 3
  • 8
4
votes
4 answers

Postfix master running as root

Does running /usr/lib/postfix/master as a root could cause a security threat ? A fresh installation, gives this : root 11622 0.0 0.0 4792 1432 ? Ss 19:11 0:00 /usr/lib/postfix/master postfix 11624 0.0 0.0 4812 1324 ? …
4m1nh4j1
  • 181
  • 1
  • 6
4
votes
1 answer

Dangerous to open a unix socket within www root?

My web server is chrooted into /var/www, and its contents are available over the network. One of my web applications needs access to a unix socket, and so that socket needs to be somewhere in /var/www to be accessible by the server. Does it pose any…
ssh2ksh
  • 141
  • 2
4
votes
2 answers

What are the benefits of having multiple overwriting patterns for secure deletion?

When installing a new AIX server, there is a possibility to use several patterns for secure deletion. My question: Is it necessary to use several patterns? What is the benefit from having several ones?
newuser999
  • 747
  • 5
  • 9
4
votes
3 answers

Are file permissions set in Unix/Linux effective in Windows or Any other OS?

Consider some files and folder in Unix/Linux OS which are configured for only read access by root, if the hard drive stolen, and used in Windows Environment, are these permissions are still effective? Same scenario: setting file and folder…
Akam
  • 1,327
  • 3
  • 14
  • 23