官术网_书友最值得收藏!

The case for more

You can see the GROUP (GID) is now testuser, and things seem reasonably secure because in order to change the user and group of an object, you need to be privileged. You can only change the permission bits on an object if you own it, with the exception of the root user. This means that if you're running as root, you can do whatever you like to the system, even without permission. This absolute authority is why a successful attack or an error on a root running process can cause grave damage to the system. Also, a successful attack on a non-root process could also cause damage by inadvertently changing the permissions bits. For example, suppose there is an unintended chmod 0666 command on your SSH private key. This would expose your secret key to all users on the system, which is almost certainly something you would never want to happen. The root limitation is partially addressed by the capabilities model.

主站蜘蛛池模板: 东兰县| 邛崃市| 昌江| 理塘县| 手游| 信丰县| 凤冈县| 林周县| 石泉县| 新竹市| 延庆县| 荃湾区| 苗栗县| 鹤庆县| 青海省| 巩留县| 天全县| 新邵县| 舒城县| 四子王旗| 宣恩县| 洱源县| 永福县| 赤壁市| 富锦市| 丁青县| 平顶山市| 民和| 瓮安县| 镇平县| 张家口市| 浦城县| 临漳县| 徐闻县| 壶关县| 田阳县| 科技| 漯河市| 志丹县| 徐州市| 贵定县|