【正文】
ead list ? W change change content ? X execute can ?cd? ? SUID Program runs with effective N/A user ID of owner ? SGID Program runs with effective Files created in dir inherit GID of owner the same GID as the dir ? Stickybit N/A Only the owner of the file and the owner of the dir may delete files in this dir Γ В ?ls l ?chmod Setting file permissions ?chown change file owner and group ?chgrp change group ownership ?umask Γ В ?有時,沒有被授權(quán)的用戶需要完成某項任務(wù)。 ? pam_set_item()。 2023, 10 Γ В ?用戶與文件 ↓ ?從 POST到 sh ↓ Γ В ?認證、授權(quán) Authentication、Authorization ?PAM Pluggable Authentication Modules ?SUID ?Permission ?setuid etc Γ В ?認證 /鑒別 Authentication ?誰是誰 ?授權(quán) Authorization ?能干什么 ?鑒別手段 ?基于口令 /令牌 /卡 /指紋 /聲音等信息 ?授權(quán)方法 ?訪問控制矩陣 ACL/ACM Γ В ?傳統(tǒng)的 AA ?應(yīng)用程序自己管理 ?PAM ?標準庫 ?PAM in Linux Γ В ? PAM was first proposed by Sun Microsystems in an Open Software Foundation Request for Comments (RFC) dated October 1995. It was adopted as the authentication framework of the Common Desktop Environment. ? As a standalone infrastructure, PAM first appeared from an opensource, LinuxPAM, development in Red Hat Linux in August 1996. ? PAM is currently supported in the AIX operating system, DragonFly BSD, FreeBSD, HPUX, Linux, Mac OS X, NetBSD and Solaris. ? PAM was later standardized as part of the X/Open UNIX standardization process, resulting in the X/Open Single Signon (XSSO) standard. Γ В ?Every application required its own security and authentication mechanism. Γ В ?“is this user authorized to use me?” Γ В ? Γ В ?PAM is used, for example, to dynamically link system binaries. ?(Dynamic linking does necessitate a recovery mechanism to address potential problems in the linker or in shared libraries. One way of implementing a recovery mechanism is to supply a /rescue directory that contains statically linked versions of important system binaries. This method is used in both NetBSD and FreeBSD.) Γ В ? 第一部分是 libpam,是實現(xiàn) PAM API的庫, ? 第二部分是 PA