Skip to main content

Unix / Linux - File Permission




We are going to discuss in detail about file permission and access modes in Unix. File ownership is an important component of Unix that provides a secure method for storing files. Every file in Unix has the following attributes −

  • Owner permissions − The owner's permissions determine what actions the owner of the file can perform on the file.
  • Group permissions − The group's permissions determine what actions a user, who is a member of the group that a file belongs to, can perform on the file.
  • Other (world) permissions − The permissions for others indicate what action all other users can perform on the file.

The Permission Indicators

While using ls -l command, it displays various information related to file permission as follows −

himel@himelrana.com:~$ ls -l /home/himel
total 40
drwxr-xr-x 4 himel himel 4096 Feb 10 23:26 Desktop
drwxr-xr-x 2 himel himel 4096 Jan 29 23:43 Documents
drwxr-xr-x 2 himel himel 4096 Jun 14  2020 Downloads
-rw-r--r-- 1 himel himel    0 Feb  4 20:02 hello.md
-rw-r--r-- 1 himel himel   10 Feb  7 19:48 hello.txt
-rw-r--r-- 1 himel himel   68 Feb  4 20:07 help.txt
drwxr-xr-x 3 himel himel 4096 Feb  4 19:25 Music
drwxr-xr-x 2 himel himel 4096 Jun 14  2020 Pictures
drwxr-xr-x 2 himel himel 4096 Jun 14  2020 Public
drwxr-xr-x 2 himel himel 4096 Jun 14  2020 Templates
drwxr-xr-x 2 himel himel 4096 Jun 14  2020 Videos

Here, the first column represents different access modes, i.e., the permission associated with a file or a directory.

The permissions are broken into groups of threes, and each position in the group denotes a specific permission, in this order: read (r), write (w), execute (x) −

  • The first three characters (2-4) represent the permissions for the file's owner. For example, -rwxr-xr-- represents that the owner has read (r), write (w) and execute (x) permission.
  • The second group of three characters (5-7) consists of the permissions for the group to which the file belongs. For example, -rwxr-xr-- represents that the group has read (r) and execute (x) permission, but no write permission.
  • The last group of three characters (8-10) represents the permissions for everyone else. For example, -rwxr-xr-- represents that there is read (r) only permission.

File Access Modes

The permissions of a file are the first line of defense in the security of a Unix system. The basic building blocks of Unix permissions are the readwrite, and execute permissions, which have been described below −

Read

        Grants the capability to read, i.e., view the contents of the file.

Write

        Grants the capability to modify, or remove the content of the file.

Execute

        User with execute permissions can run a file as a program.


Directory Access Modes

Directory access modes are listed and organized in the same manner as any other file. There are a few differences that need to be mentioned −


Read

        Access to a directory means that the user can read the contents. The user can look at  the filenames inside the directory.

Write

        Access means that the user can add or delete files from the directory.

Execute

        Executing a directory doesn't really make sense, so think of this as a traverse permission.

        A user must have execute access to the bin directory in order to execute the ls or the cd command.


Changing Permissions

To change the file or the directory permissions, you use the chmod (change mode) command. There are two ways to use chmod — the symbolic mode and the absolute mode.

Using chmod in Symbolic Mode

The easiest way for a beginner to modify file or directory permissions is to use the symbolic mode. With symbolic permissions you can add, delete, or specify the permission set you want by using the operators in the following table.

Sr.No.Chmod operator & Description
1

+

Adds the designated permission(s) to a file or directory.

2

-

Removes the designated permission(s) from a file or directory.

3

=

Sets the designated permission(s).

Here's an example using testfile. Running ls -1 on the testfile shows that the file's permissions are as follows −

himel@himelrana.com:~$ ls -l testfile
-rwxrwxr--  1 amrood   users 1024  Nov 2 00:10  testfile

Then each example chmod command from the preceding table is run on the testfile, followed by ls –l, so you can see the permission changes −


himel@himelrana.com:~$ chmod o+wx testfile
himel@himelrana.com:~$ ls -l testfile
-rwxrwxrwx  1 amrood   users 1024  Nov 2 00:10  testfile
himel@himelrana.com:~$ chmod u-x testfile
himel@himelrana.com:~$ ls -l testfile
-rw-rwxrwx  1 amrood   users 1024  Nov 2 00:10  testfile
himel@himelrana.com:~$ chmod g = rx testfile
himel@himelrana.com:~$ ls -l testfile
-rw-r-xrwx  1 amrood   users 1024  Nov 2 00:10  testfile

Here's how you can combine these commands on a single line −

$chmod o+wx,u-x,g = rx testfile
$ls -l testfile
-rw-r-xrwx  1 amrood   users 1024  Nov 2 00:10  testfile

Using chmod with Absolute Permissions

The second way to modify permissions with the chmod command is to use a number to specify each set of permissions for the file.

Each permission is assigned a value, as the following table shows, and the total of each set of permissions provides a number for that set.

NumberOctal Permission RepresentationRef
0No permission---
1Execute permission--x
2Write permission-w-
3Execute and write permission: 1 (execute) + 2 (write) = 3-wx
4Read permissionr--
5Read and execute permission: 4 (read) + 1 (execute) = 5r-x
6Read and write permission: 4 (read) + 2 (write) = 6rw-
7All permissions: 4 (read) + 2 (write) + 1 (execute) = 7rwx

Here's an example using the testfile. Running ls -1 on the testfile shows that the file's permissions are as follows −


himel@himelrana.com:~$ ls -l testfile
-rwxrwxr--  1 amrood   users 1024  Nov 2 00:10  testfile

Then each example chmod command from the preceding table is run on the testfile, followed by ls –l, so you can see the permission changes −

himel@himelrana.com:~$ chmod 755 testfile
$ls -l testfile
-rwxr-xr-x  1 amrood   users 1024  Nov 2 00:10  testfile
himel@himelrana.com:~$ chmod 743 testfile
himel@himelrana.com:~$ ls -l testfile
-rwxr---wx  1 amrood   users 1024  Nov 2 00:10  testfile
himel@himelrana.com:~$ chmod 043 testfile
himel@himelrana.com:~$ ls -l testfile
----r---wx  1 amrood   users 1024  Nov 2 00:10  testfile

Changing Owners and Groups


While creating an account on Unix, it assigns a owner ID and a group ID to each user. All the permissions mentioned above are also assigned based on the Owner and the Groups.

Two commands are available to change the owner and the group of files −

  • chown − The chown command stands for "change owner" and is used to change the owner of a file.
  • chgrp − The chgrp command stands for "change group" and is used to change the group of a file.

Changing Ownership

The chown command changes the ownership of a file. The basic syntax is as follows −


himel@himelrana.com:~$ chown user filelist

The value of the user can be either the name of a user on the system or the user id (uid) of a user on the system.

The following example will help you understand the concept −

himel@himelrana.com:~$ chown amrood testfile

Changes the owner of the given file to the user amrood.

NOTE − The super user, root, has the unrestricted capability to change the ownership of any file but normal users can change the ownership of only those files that they own.


Changing Group Ownership

The chgrp command changes the group ownership of a file. The basic syntax is as follows −

himel@himelrana.com:~$ chgrp group filelist

The value of group can be the name of a group on the system or the group ID (GID) of a group on the system.

Following example helps you understand the concept −

himel@himelrana.com:~$ chgrp special testfile

Changes the group of the given file to special group.

SUID and SGID File Permission

Often when a command is executed, it will have to be executed with special privileges in order to accomplish its task.


As an example, when you change your password with the passwd command, your new password is stored in the file /etc/shadow.

As a regular user, you do not have read or write access to this file for security reasons, but when you change your password, you need to have the write permission to this file. This means that the passwd program has to give you additional permissions so that you can write to the file /etc/shadow.

Additional permissions are given to programs via a mechanism known as the Set User ID (SUID) and Set Group ID (SGID) bits.

When you execute a program that has the SUID bit enabled, you inherit the permissions of that program's owner. Programs that do not have the SUID bit set are run with the permissions of the user who started the program.

This is the case with SGID as well. Normally, programs execute with your group permissions, but instead your group will be changed just for this program to the group owner of the program.

The SUID and SGID bits will appear as the letter "s" if the permission is available. The SUID "s" bit will be located in the permission bits where the owners’ execute permission normally resides.

For example, the command −


himel@himelrana.com:~$ ls -l /usr/bin/passwd
-r-sr-xr-x  1   root   bin  19031 Feb 7 13:47  /usr/bin/passwd*

Shows that the SUID bit is set and that the command is owned by the root. A capital letter S in the execute position instead of a lowercase s indicates that the execute bit is not set.

If the sticky bit is enabled on the directory, files can only be removed if you are one of the following users −

  • The owner of the sticky directory
  • The owner of the file being removed
  • The super user, root

To set the SUID and SGID bits for any directory try the following command −

himel@himelrana.com:~$ chmod ug+s dirname
himel@himelrana.com:~$ ls -l
drwsr-sr-x 2 root root  4096 Jun 19 06:45 dirname

Comments

  1. The History of the Casino - One of the Most Popular Casinos
    A relative newcomer to the world apr casino of online gambling, 바카라 사이트 Wynn Las งานออนไลน์ Vegas opened its doors to a new audience of over 600,000 in 2017. This was casinosites.one the first wooricasinos.info casino

    ReplyDelete
  2. Create molds with complicated shapes and superior durability in minimal time. Innovationswhile nonetheless harnessing the infinite problem-solving concepts. 3D printing Manchester takes satisfaction in the satisfaction of every considered one of our shoppers. A brilliantly executed 3D design brings a euphoria of pleasure and pleasure, seeing your idea materialised. best king duvet covers You may possess an older gadget, machine and even automobile and cannot find a part critical to its operate. 3D printing is right for recreating legacy elements and bringing older objects new leases of life.

    ReplyDelete

Post a Comment

Popular posts from this blog

Change default grub boot kernel – CentOS/RHEL/OEL 7

How to modify the GRUB2 default entry to boot a different Kernel version? 1. Check the current running Kernel Version # uname -a Linux geeklab 3.8.13-94.el7uek.x86_64 #2 SMP Wed Feb 11 14:18:22 PST 2015 x86_64 x86_64 x86_64 GNU/Linux 2. List the Kernel Entries as per GRUB2 file: # awk -F\' '$1=="menuentry " {print $2}' /etc/grub2.cfg Oracle Linux Server, with Unbreakable Enterprise Kernel 3.8.13-94.el7uek.x86_64 Oracle Linux Server, with Unbreakable Enterprise Kernel 3.8.13-94.el7uek.x86_64 with debugging Oracle Linux Server 7.1, with Linux 3.10.0-229.el7.x86_64 Oracle Linux Server 7.1, with Unbreakable Enterprise Kernel 3.8.13-55.1.6.el7uek.x86_64 Oracle Linux Server 7.1, with Linux 0-rescue-441e86c9ff854310a306bd33e56aae2b NOTE: The first entry is denoted as Zero. So currently the Server is booted to 0th entry as per the above `uname -a` command output. 3. Let us modify the Kernel Version to 3.8.13-55.1.6.el7uek.x86_64 which is at line nu

What is Unix or Linux ?

  What is Unix ? The Unix operating system is a set of programs that act as a link between the computer and the user. The computer programs that allocate the system resources and coordinate all the details of the computer's internals is called the  operating system  or the  kernel . Users communicate with the kernel through a program known as the  shell . The shell is a command line interpreter; it translates commands entered by the user and converts them into a language that is understood by the kernel. Unix was originally developed in 1969 by a group of AT&T employees Ken Thompson, Dennis Ritchie, Douglas McIlroy, and Joe Ossanna at Bell Labs. There are various Unix variants available in the market. Solaris Unix, AIX, HP Unix and BSD are a few examples. Linux is also a flavor of Unix which is freely available. Several people can use a Unix computer at the same time; hence Unix is called a multiuser system. A user can also run multiple programs at the same time; hence Unix is