To change directory permissions in Linux, use the following: Show
Note that “r” is for read, “w” is for write, and “x” is for execute. This only changes the permissions for the owner of the file. How to Change Directory Permissions in Linux for the Group Owners and OthersThe command for changing directory permissions for group owners is similar, but add a “g” for group or “o” for users:
To change directory permissions for everyone, use “u” for users, “g” for group, “o” for others, and “ugo” or “a” (for all).
How to Change Groups of Files and Directories in LinuxBy issuing these commands, you can change groups of files and directories in Linux.
Note that the group must exit before you can assign groups to files and directories. How to change ownership in LinuxAnother helpful command is changing ownerships of files and directories in Linux:
These commands will give ownership to someone, but all sub files and directories still belong to the original owner. You can also combine the group and ownership command by using:
How to change permissions in numeric code in LinuxYou may need to know how to change permissions in numeric code in Linux, so to do this you use numbers instead of “r”, “w”, or “x”.
Basically, you add up the numbers depending on the level of permission you want to give. Permission numbers are:
For example:
As you can see, there are several options when it comes to permissions. You have the capability to dictate usability among users. While it may be easier to just give all permission to everyone, it may end up biting you in the end. So choose wisely. Want to get Certified in Linux?This chapter is from the book Working with PermissionsUnder Linux (and UNIX), everything in the file system, including directories and devices, is a file. And every file on your system has an accompanying set of permissions based on ownership. These permissions provide data security by giving specific permission settings to every single item denoting who may read, write, or execute the file. These permissions are set individually for the file’s owner, for members of the group the file belongs to, and for all others on the system. You can examine the default permissions for a file you create by using the umask command, which lists default permissions using the number system explained next, or by using the touch command and then the ls command’s long-format listing, like this: matthew@seymour:~$ touch file matthew@seymour:~$ ls -l file -rw-r--r-- 1 matthew matthew 0 2015-06-30 13:06 file In this example, the touch command quickly creates a file. The ls command then reports on the file, displaying the following (from left to right):
Assigning PermissionsUnder Linux, permissions are grouped by owner, group, and others, with read, write, and execute permission assigned to each, as follows: Owner Group Others rwx rwx rxw Permissions can be indicated by mnemonic or octal characters. Mnemonic characters are listed here:
In the previous example for the file named file, the owner, matthew, has read and write permission. Any member of the group named matthew may only read the file. All other users may only read the file. Also note that default permissions for files created by the root operator (while using sudo or a root account) will differ because of umask settings assigned by the shell. Many users prefer to use numeric codes, based on octal (base 8) values, to represent permissions. Here’s what these values mean:
In octal notation, the previous example file has a permission setting of 644 (read + write or 4 + 2, read-only or 4, read-only or 4). Although you can use either form of permissions notation, octal is easy to use quickly when you visualize and understand how permissions are numbered. Directory PermissionsDirectories are also files under Linux. For example, again use the ls command to show permissions, like this: matthew@seymour:~$ mkdir directory matthew@seymour:~$ ls -ld directory drwxr-xr-x 2 matthew matthew 4096 2015-06-30 13:23 directory In this example, the mkdir command is used to create a directory. The ls command, with its -ld option, is used to show the permissions and other information about the directory (not its contents). Here you can see that the directory has permission values of 755 (read + write + execute or 4 + 2 + 1, read + execute or 4 + 1, and read + execute or 4 + 1). This shows that the owner can read and write to the directory and, because of execute permission, also list the directory’s contents. Group members and all other users can list only the directory contents. Note that directories require execute permission for anyone to be able to view their contents. You should also notice that the ls command’s output shows a leading d in the permissions field. This letter specifies that this file is a directory; normal files have a blank field in its place. Other files, such as those specifying a block or character device, have a different letter. For example, if you examine the device file for a Linux serial port, you see the following: matthew@seymour:~$ ls -l /dev/ttyS0 crw-rw---- 1 root dialout 4, 64 2015-06-30 08:13 /dev/ttyS0 Here, /dev/ttyS0 is a character device (such as a serial communications port and designated by a c) owned by root and available to anyone in the dialout group. The device has permissions of 660 (read + write, read + write, no permission). On the other hand, if you examine the device file for an IDE hard drive, you see this: matthew@seymour:~$ ls -l /dev/sda brw-rw-- -- 1 root disk 8, 0 2015-06-30 08:13 /dev/sda In this example, b designates a block device (a device that transfers and caches data in blocks) with similar permissions. Other device entries you will run across on your Linux system include symbolic links, designated by s. Altering File Permissions with chmodYou can use the chmod command to alter a file’s permissions. This command uses various forms of command syntax, including octal or a mnemonic form (such as u, g, o, or a and rwx, and so on) to specify a desired change. You can use the chmod command to add, remove, or modify file or directory permissions to protect, hide, or open up access to a file by other users (except for the root account or a user with super user permission and using sudo, either of which can access any file or directory on a Linux system). The mnemonic forms of chmod’s options are (when used with a plus character, +, to add, or a minus sign, -, to remove):
For example, if you create a file, such as a readme.txt, the file has the following default permissions (set by the umask setting in /etc/bashrc, covered in the next section): -rw-r--r-- 1 matthew matthew 0 2015-06-30 13:33 readme.txt As you can see, you can read and write the file. Anyone else can only read the file (and only if it is outside your home directory, which will have read, write, and execute permission set only for you, the owner). You can remove all write permission for anyone by using chmod, the minus sign (-), and aw, as follows: matthew@seymour:~$ chmod a-w readme.txt matthew@seymour:~$ ls -l readme.txt -r--r--r-- 1 matthew matthew 0 2015-06-30 13:33 readme.txt Now, no one can write to the file (except you, if the file is in your /home or /tmp directory because of directory permissions). To restore read and write permission for only you as the owner, use the plus sign (+) and the u and rw options, like so: matthew@seymour:~$ chmod u+rw readme.txt matthew@seymour:~$ ls -l readme.txt -rw-r--r-- 1 matthew matthew 0 2015-06-30 13:33 readme.txt You can also use the octal form of the chmod command (for example, to modify a file’s permissions so that only you, the owner, can read and write a file). Use the chmod command and a file permission of 600, like this: matthew@seymour:~$ chmod 600 readme.txt matthew@seymour:~$ ls -l readme.txt -rw------- 1 matthew matthew 0 2015-06-30 13:33 readme.txt If you take away execution permission for a directory, files might be hidden inside and may not be listed or accessed by anyone else (except the root operator, of course, who has access to any file on your system). By using various combinations of permission settings, you can quickly and easily set up a more secure environment, even as a normal user in your /home directory. File Permissions with umaskWhen you create a file, it is created with a default set of permissions. You can view and modify the default permissions for files with umask, which works like a filter. When a file is created by a user account, whether that account is owned by a human like matthew or a process like init, the file will be created using specific permissions. The numbers we used above when discussing file permissions are also used with umask, but with an interesting change. Now, the numbers defined in umask are subtracted from the ultimate file permissions. So, if you wanted all new files to be created with a default permission of 777, you would type this: matthew@seymour:~$ umask 000 Of course, you would never want to have all your files accessible by default because that would be incredibly insecure and unsafe. The default umask is 022, which means that files are created by default with 755 permissions, except in your /home directory where the umask is 002 and files are created with 775. To find the current umask setting, use this: matthew@seymour:~$ umask This may list four digits instead of three. If so, don’t be confused. The additional digit is the first one; it is explained later in this chapter, in the section “Understanding Set User ID, Set Group ID, and Sticky Bit Permissions.” To change the umask setting—for example, if you wanted the default to be 740—use the following: matthew@seymour:~$ umask 037 File Permissions with chgrpYou can use the chgrp command to change the group to which a file belongs: matthew@seymour:~$ chgrp wheel filename Changing File Permissions with chownYou can use the chown command to change the owner of a file: matthew@seymour:~$ chown matthew filename You can also use the chown command to change the group of a file at the same time: matthew@seymour:~$ chown matthew:wheel filename Understanding Set User ID, Set Group ID, and Sticky Bit PermissionsThe first two of the three listed types of permission are “set user ID,” known as suid, and “set group ID,” or sgid. These settings, when used in a program, enable any user running that program to have program owner or group owner permissions for that program. These settings enable the program to be run effectively by anyone, without requiring that each user’s permissions be altered to include specific permissions for that program. One commonly used program with suid permissions is the passwd command: matthew@seymour:~$ ls -l /usr/bin/passwd -rwsr-xr-x 1 root root 42856 2015-01-26 10:09 /usr/bin/passwd This setting allows normal users to execute the command (as root) to make changes to a root-only-accessible file /etc/passwd. By default, suid and sgid are turned off on files. To set them, add an extra digit to the beginning of a number in a chmod command. Suid uses 4. Sgid uses 2. You can set both at the same time by using 6 (4 + 2). For example, for a file owned by root with current 711 permissions allowing anyone to run it, you can make it run as root with the following: matthew@seymour:~$ chmod 4711 filename Files or programs that have suid or guid permissions can sometimes present security holes because they bypass normal permissions. This problem is compounded if the permission extends to an executable binary (a command) with an inherent security flaw because it could lead to any system user or intruder gaining root access. In past exploits, this typically happened when a user fed a vulnerable command with unexpected input (such as a long pathname or option); the command would fail, and the user would be presented with a root prompt. Although Linux developers are constantly on the lookout for poor programming practices, new exploits are found all the time and can crop up unexpectedly, especially in newer software packages that haven’t had the benefit of peer developer review. Savvy Linux system administrators keep the number of suid or guid files present on a system to a minimum. The find command can be used to display all such files on a system: matthew@seymour:~$ sudo find / -type f -perm /6000 -exec ls -l {} \; Note that the programs do not necessarily have to be removed from your system. If your users really do not need to use the program, you can remove a program’s execute permission for anyone. As the root operator, you have to decide whether your users are allowed, for example, to mount and unmount CD-ROMs or other media on your system. Although Linux-based operating systems can be set up to accommodate ease of use and convenience, allowing programs such as mount to be suid might not be the best security policy. Other candidates for suid permission change could include the chsh, at, or chage commands. An additional setting called the sticky bit is available using this same additional first digit. A sticky bit limits who may rename or delete files within a directory. When it is set, files in that directory may be unlinked or renamed only by a super user, the directory owner, or the file owner. Set the sticky bit to on by using a 1, like this for a directory with 755 permissions: matthew@seymour:~$ chmod 1755 directoryname You can set the sticky bit concurrently with suid and sgid, like this (4 + 2 + 1): matthew@seymour:~$ chmod 7755 directoryname Setting Permissions with Access Control ListsPOSIX is a family of standards created to maintain stability and consistency across operating systems for UNIX and UNIX-like systems, such as Linux. One important feature of POSIX is the access control list (ACL; often pronounced “AK-el”). ACLs permit even more fine-grained control over access permissions. By default, all files have an ACL. To view the ACL for a file, use this: matthew@seymour:~$ getfacl filename Typical getfacl output includes multiple lines, like this for filename.txt: # file: filename.txt # owner: matthew # group: matthew user::rw- group::rw- other::r-- The information listed here is standard and clear, based on what you already know. The real power of ACLs is that you can add to them. You are not restricted to the standard set of user, group, other. You can add multiple users and groups with permissions specific to each. To add the user sandra with read, write, and execute permissions to the ACL for a file named secrets.txt, use the following: matthew@seymour:~$ setfacl -m u:sandra:rwx secrets.txt To remove and reset sandra’s permissions on the file to the file’s defaults, use the following: matthew@seymour:~$ setfacl -r u:sandra: secrets.txt From these two examples, you can see that -m is for modify and -r is for remove. ACLs permit similar actions with groups and others as with a user. Instead of the u: before the name, use a g: for groups and an o: for others, like this: matthew@seymour:~$ setfacl -m g:groupname:rwx secrets.txt matthew@seymour:~$ setfacl -m o:r secrets.txt Notice that with others, there is no username or group name to include in the commands. A useful feature is masking, which allows you to list only the permissions that are available, as in this example: matthew@seymour:~$ setfacl -m m:rx secrets.txt This limits everyone, regardless of any other settings. So, in this case, a group may have rwx settings on the file, but the mask here says to only permit rx, so rx will be the only settings that are available. As an exercise, see if you can figure out the meaning of this output from getfacl for a file named coffeecup.conf: # file: coffeecup.conf # owner: matthew # group: yirgacheffe user::rw- group::rw- other::r-- group:qa:rwx group:uat:rwx mask::rwx Which of these command will set the permission on file text file to read and write for the owner read for the group and nothing for everyone else?Which of these commands will set the permissions on file textfile to read and write for the owner, read for the group, and nothing for everyone else? Explanation: None. 6.
Which command will set the permission on file Oscar?1. Which command is used to change the permissions of a file? Explanation: The chmod (change mode) command is used to change the permissions of files. This command can only be run by the owner of the file or by the super user.
What is the command to give execute permission to the owner of the file?Only the current owner or superuser can use the chmod command to change file permissions on a file or directory. Change permissions in symbolic mode by using the chmod command.
Which command adds execute permission for owner and read permission for group and others?To give the owner all permissions and world execute you would type chmod 701 [filename]. To give the owner all permissions and world read and execute you would type chmod 705 [filename].
|