Knowledge

Unix security

Source 📝

158: 542: 1263: 220: 63: 22: 1275: 417: 480:
Operating systems, like all software, may contain bugs in need of fixing or may be enhanced with the addition of new features; many UNIX systems come with a package manager for this. Patching the operating system in a secure manner requires that the software come from a trustworthy source and not
428:
account. If access to this account is gained by an unwanted user, this results in a complete breach of the system. A root account however is necessary for administrative purposes, and for the above security reasons the root account is
527:
protects systems and networks from network threats which exist on the opposite side of the firewall. Firewalls can block access to strictly internal services, unwanted users and in some cases filter network traffic by content.
661: 481:
have been altered since it was packaged. Common methods for verifying that operating system patches have not been altered include the use of the
424:
Most Unix and Unix-like systems have an account or group which enables a user to exact complete control over the system, often known as a
671: 679: 73: 656: 383:
permit different users access to a file with different privilege (e.g., reading, writing, execution). Like users, different
284: 131: 256: 103: 1301: 624: 321: 303: 263: 201: 179: 110: 49: 172: 1321: 513: 684: 1306: 785: 706: 270: 241: 237: 117: 88: 35: 1316: 501:
There are viruses and worms that target Unix-like operating systems. In fact, the first computer worm—the
395:
Many Unix implementations add an additional layer of security by requiring that a user be a member of the
252: 99: 1244: 1050: 954: 909: 551: 1238: 1193: 824: 939: 166: 401: 372: 366: 230: 1084: 183: 1172: 1279: 1232: 437:
program is more commonly used), so usage of the root account can be more closely monitored.
617:
UNIX Administration: A Comprehensive Sourcebook for Effective Systems and Network Management
457:
On many UNIX systems, user and password information, if stored locally, can be found in the
1227: 1130: 277: 124: 8: 1144: 726: 558:
Please help update this article to reflect recent events or newly available information.
1159: 699: 509: 486: 84: 41: 1165: 737: 620: 482: 397: 338: 772: 722: 524: 380: 349: 752: 747: 742: 714: 665: 376: 1005: 1311: 1295: 1267: 1112: 1103: 966: 817: 692: 594:
like operating systems may provide their own native functionality and other
934: 929: 1200: 1011: 595: 502: 1221: 1118: 1025: 1000: 944: 914: 762: 1056: 719: 583: 556:. The reason given is: Iptables is no longer the "current interface". 425: 346: 646:
Simson Garfinkel and Gene Spafford, O'Reilly & Associates, 2003.
219: 80: 62: 1214: 1066: 1032: 919: 874: 859: 587: 575: 451: 1207: 1186: 1179: 1017: 983: 854: 839: 812: 802: 416: 1154: 1073: 949: 924: 888: 844: 807: 796: 458: 1124: 1091: 1078: 988: 900: 881: 867: 829: 579: 490: 454:
and guarding them properly are important for Unix security.
420:
Sudo command on Ubuntu to temporarily assume root privileges
994: 977: 849: 715: 591: 434: 342: 379:
have permissions set enabling different access to a file.
1097: 1061: 834: 658:
The Unix Security Model for web server administration
440: 578:is the current user interface for interacting with 244:. Unsourced material may be challenged and removed. 673:An Architectural Overview of UNIX Network Security 554:may be compromised due to out-of-date information 1293: 371:A core security feature in these systems is the 493:based checksum, or the use of read-only media. 700: 496: 89:introducing citations to additional sources 50:Learn how and when to remove these messages 707: 693: 322:Learn how and when to remove this message 304:Learn how and when to remove this message 202:Learn how and when to remove this message 415: 165:This article includes a list of general 79:Relevant discussion may be found on the 470: 1294: 387:have different permissions on a file. 688: 644:Practical UNIX and Internet Security, 1274: 614: 535: 242:adding citations to reliable sources 213: 151: 56: 15: 608: 13: 441:User and administrative techniques 433:used for day to day purposes (the 355: 171:it lacks sufficient corresponding 14: 1333: 650: 31:This article has multiple issues. 1273: 1262: 1261: 540: 218: 156: 72:relies largely or entirely on a 61: 20: 1260:indicate discontinued systems. 229:needs additional citations for 39:or discuss these issues on the 411: 390: 360: 1: 601: 586:functionality. It replaced 519: 512:for UNIX-like systems, from 445: 7: 1245:Windows Subsystem for Linux 531: 475: 10: 1338: 637: 619:. CRC Press. p. 207. 497:Viruses and virus scanners 364: 1302:Operating system security 1253: 1239:Windows Services for UNIX 1194:Microsoft POSIX subsystem 1143: 1042: 963: 898: 782: 771: 733: 598:firewall products exist. 375:. All files in a typical 676:Robert B. Reinhardt 1993 505:—targeted Unix systems. 1322:Linux security software 404:in order to access the 373:file system permissions 367:File system permissions 337:refers to the means of 186:more precise citations. 615:Levi, Bozidar (2002). 421: 1307:System administration 1233:UserLAnd Technologies 668:Robert K. Moniot 2000 419: 402:user privileges group 1317:Linux administration 1228:UNIX System Services 727:compatibility layers 680:Unix security papers 471:Software maintenance 238:improve this article 85:improve this article 955:Other distributions 664:2006-10-04 at the 487:cryptographic hash 422: 1289: 1288: 1139: 1138: 723:operating systems 573: 572: 483:digital signature 450:Selecting strong 332: 331: 324: 314: 313: 306: 288: 212: 211: 204: 150: 149: 135: 54: 1329: 1277: 1276: 1265: 1264: 780: 779: 709: 702: 695: 686: 685: 631: 630: 612: 568: 565: 559: 552:factual accuracy 544: 543: 536: 525:Network firewall 514:multiple vendors 466: 461: 407: 381:Unix permissions 350:operating system 327: 320: 309: 302: 298: 295: 289: 287: 246: 222: 214: 207: 200: 196: 193: 187: 182:this article by 173:inline citations 160: 159: 152: 145: 142: 136: 134: 93: 65: 57: 46: 24: 23: 16: 1337: 1336: 1332: 1331: 1330: 1328: 1327: 1326: 1292: 1291: 1290: 1285: 1249: 1146: 1135: 1038: 959: 894: 774: 767: 729: 713: 666:Wayback Machine 653: 640: 635: 634: 627: 613: 609: 604: 569: 563: 560: 557: 549:This section's 545: 541: 534: 522: 499: 478: 473: 464: 459: 448: 443: 414: 405: 393: 377:Unix filesystem 369: 363: 358: 356:Design concepts 328: 317: 316: 315: 310: 299: 293: 290: 253:"Unix security" 247: 245: 235: 223: 208: 197: 191: 188: 178:Please help to 177: 161: 157: 146: 140: 137: 100:"Unix security" 94: 92: 78: 66: 25: 21: 12: 11: 5: 1335: 1325: 1324: 1319: 1314: 1309: 1304: 1287: 1286: 1284: 1283: 1271: 1254: 1251: 1250: 1248: 1247: 1242: 1235: 1230: 1225: 1218: 1211: 1204: 1197: 1190: 1183: 1176: 1169: 1162: 1157: 1151: 1149: 1141: 1140: 1137: 1136: 1134: 1133: 1128: 1121: 1116: 1109: 1108: 1107: 1095: 1088: 1081: 1076: 1071: 1070: 1069: 1059: 1054: 1046: 1044: 1040: 1039: 1037: 1036: 1029: 1022: 1021: 1020: 1015: 1003: 998: 991: 986: 981: 973: 971: 961: 960: 958: 957: 952: 947: 942: 937: 932: 927: 922: 917: 912: 906: 904: 896: 895: 893: 892: 885: 878: 871: 864: 863: 862: 857: 852: 847: 842: 837: 832: 822: 821: 820: 815: 810: 805: 792: 790: 777: 769: 768: 766: 765: 760: 755: 750: 745: 740: 734: 731: 730: 712: 711: 704: 697: 689: 683: 682: 677: 669: 652: 651:External links 649: 648: 647: 639: 636: 633: 632: 625: 606: 605: 603: 600: 571: 570: 548: 546: 539: 533: 530: 521: 518: 510:virus scanners 498: 495: 477: 474: 472: 469: 447: 444: 442: 439: 413: 410: 392: 389: 365:Main article: 362: 359: 357: 354: 330: 329: 312: 311: 294:September 2014 226: 224: 217: 210: 209: 164: 162: 155: 148: 147: 83:. Please help 69: 67: 60: 55: 29: 28: 26: 19: 9: 6: 4: 3: 2: 1334: 1323: 1320: 1318: 1315: 1313: 1310: 1308: 1305: 1303: 1300: 1299: 1297: 1282: 1281: 1272: 1270: 1269: 1259: 1256: 1255: 1252: 1246: 1243: 1241: 1240: 1236: 1234: 1231: 1229: 1226: 1224: 1223: 1219: 1217: 1216: 1212: 1210: 1209: 1205: 1203: 1202: 1198: 1196: 1195: 1191: 1189: 1188: 1184: 1182: 1181: 1177: 1175: 1174: 1170: 1168: 1167: 1163: 1161: 1158: 1156: 1153: 1152: 1150: 1148: 1145:Compatibility 1142: 1132: 1129: 1127: 1126: 1122: 1120: 1117: 1115: 1114: 1113:Research Unix 1110: 1106: 1105: 1104:BlackBerry 10 1101: 1100: 1099: 1096: 1094: 1093: 1089: 1087: 1086: 1082: 1080: 1077: 1075: 1072: 1068: 1065: 1064: 1063: 1060: 1058: 1055: 1053: 1052: 1048: 1047: 1045: 1041: 1035: 1034: 1030: 1028: 1027: 1023: 1019: 1016: 1014: 1013: 1009: 1008: 1007: 1004: 1002: 999: 997: 996: 992: 990: 987: 985: 982: 980: 979: 975: 974: 972: 970: 969: 968: 962: 956: 953: 951: 948: 946: 943: 941: 938: 936: 933: 931: 928: 926: 923: 921: 918: 916: 913: 911: 908: 907: 905: 903: 902: 897: 891: 890: 886: 884: 883: 879: 877: 876: 872: 870: 869: 865: 861: 858: 856: 853: 851: 848: 846: 843: 841: 838: 836: 833: 831: 828: 827: 826: 823: 819: 818:DragonFly BSD 816: 814: 811: 809: 806: 804: 801: 800: 799: 798: 794: 793: 791: 789: 788: 787: 781: 778: 776: 770: 764: 761: 759: 756: 754: 751: 749: 746: 744: 741: 739: 736: 735: 732: 728: 724: 721: 717: 710: 705: 703: 698: 696: 691: 690: 687: 681: 678: 675: 674: 670: 667: 663: 660: 659: 655: 654: 645: 642: 641: 628: 626:0-8493-1351-1 622: 618: 611: 607: 599: 597: 593: 589: 585: 581: 577: 567: 555: 553: 547: 538: 537: 529: 526: 517: 515: 511: 506: 504: 494: 492: 488: 484: 468: 462: 455: 453: 438: 436: 432: 427: 418: 409: 403: 400: 399: 388: 386: 382: 378: 374: 368: 353: 351: 348: 344: 340: 336: 335:Unix security 326: 323: 308: 305: 297: 286: 283: 279: 276: 272: 269: 265: 262: 258: 255: –  254: 250: 249:Find sources: 243: 239: 233: 232: 227:This article 225: 221: 216: 215: 206: 203: 195: 185: 181: 175: 174: 168: 163: 154: 153: 144: 133: 130: 126: 123: 119: 116: 112: 109: 105: 102: –  101: 97: 96:Find sources: 90: 86: 82: 76: 75: 74:single source 70:This article 68: 64: 59: 58: 53: 51: 44: 43: 38: 37: 32: 27: 18: 17: 1278: 1266: 1257: 1237: 1220: 1213: 1206: 1199: 1192: 1185: 1178: 1171: 1164: 1123: 1111: 1102: 1090: 1083: 1049: 1031: 1024: 1010: 993: 976: 965: 964: 899: 887: 880: 873: 866: 795: 784: 783: 757: 738:Architecture 672: 657: 643: 616: 610: 574: 564:January 2014 561: 550: 523: 507: 500: 489:, such as a 479: 456: 449: 430: 423: 396: 394: 384: 370: 334: 333: 318: 300: 291: 281: 274: 267: 260: 248: 236:Please help 231:verification 228: 198: 189: 170: 138: 128: 121: 114: 107: 95: 71: 47: 40: 34: 33:Please help 30: 1201:MKS Toolkit 1012:OpenSolaris 596:open source 503:Morris worm 467:file pair. 465:/etc/shadow 460:/etc/passwd 412:Root access 391:User groups 385:user groups 361:Permissions 184:introducing 1296:Categories 1222:PWS/VSE-AF 1119:SerenityOS 1026:Tru64 UNIX 1001:OpenServer 753:Philosophy 743:Filesystem 602:References 508:There are 264:newspapers 192:April 2024 167:references 141:April 2024 111:newspapers 36:improve it 1057:Domain/OS 773:Operating 720:Unix-like 590:. Other 584:netfilter 520:Firewalls 452:passwords 446:Passwords 408:command. 347:Unix-like 81:talk page 42:talk page 1268:Category 1215:P.I.P.S. 1051:Coherent 1033:UnixWare 967:System V 920:ChromeOS 875:NeXTSTEP 860:bridgeOS 758:Security 662:Archived 588:ipchains 576:iptables 532:iptables 476:Patching 339:securing 1280:Commons 1258:Italics 1187:MachTen 1180:Interix 1160:Darling 1131:more... 1018:Illumos 1006:Solaris 940:Red Hat 910:Android 855:watchOS 840:audioOS 813:OpenBSD 803:FreeBSD 775:systems 748:History 638:General 582:kernel 491:SHA-256 278:scholar 180:improve 125:scholar 1166:Eunice 1155:Cygwin 1147:layers 1074:LynxOS 950:Ubuntu 935:Gentoo 930:Fedora 925:Debian 889:Ultrix 845:iPadOS 825:Darwin 808:NetBSD 797:386BSD 623:  431:seldom 280:  273:  266:  259:  251:  169:, but 127:  120:  113:  106:  98:  1125:Xenix 1092:OSF/1 1079:Minix 1043:Other 989:HP-UX 901:Linux 882:SunOS 868:DYNIX 830:macOS 763:Shell 580:Linux 485:of a 398:wheel 285:JSTOR 271:books 132:JSTOR 118:books 1312:Unix 1208:PASE 1067:Hurd 995:IRIX 978:A/UX 945:SUSE 915:Arch 850:tvOS 725:and 718:and 716:Unix 621:ISBN 592:Unix 463:and 435:sudo 426:root 343:Unix 257:news 104:news 1173:GNV 1098:QNX 1085:MOS 1062:GNU 984:AIX 835:iOS 786:BSD 345:or 240:by 87:by 1298:: 516:. 406:su 352:. 341:a 45:. 708:e 701:t 694:v 629:. 566:) 562:( 325:) 319:( 307:) 301:( 296:) 292:( 282:· 275:· 268:· 261:· 234:. 205:) 199:( 194:) 190:( 176:. 143:) 139:( 129:· 122:· 115:· 108:· 91:. 77:. 52:) 48:(

Index

improve it
talk page
Learn how and when to remove these messages

single source
talk page
improve this article
introducing citations to additional sources
"Unix security"
news
newspapers
books
scholar
JSTOR
references
inline citations
improve
introducing
Learn how and when to remove this message

verification
improve this article
adding citations to reliable sources
"Unix security"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.