
group:mascots:rwx
# effective: r-x
mask::r-x
other::---
After executing the
chmod
command to remove the write permission from the group
class bits, the output of the
ls
command is sufficient to see that the mask bits must
have changed accordingly: write permission is again limited to the owner of
mydir
.
The output of the
getfacl
confirms this. This output includes a comment for all those
entries in which the effective permission bits do not correspond to the original permis-
sions, because they are filtered according to the mask entry. The original permissions
can be restored at any time with
chmod g+w mydir
.
10.4.3 A Directory with a Default ACL
Directories can have a default ACL, which is a special kind of ACL defining the access
permissions that objects in the directory inherit when they are created. A default ACL
affects both subdirectories and files.
Effects of a Default ACL
There are two ways in which the permissions of a directory's default ACL are passed
to the files and subdirectories:
• A subdirectory inherits the default ACL of the parent directory both as its default
ACL and as an access ACL.
• A file inherits the default ACL as its access ACL.
All system calls that create file system objects use a
mode
parameter that defines the
access permissions for the newly created file system object. If the parent directory does
not have a default ACL, the permission bits as defined by the
umask
are subtracted
from the permissions as passed by the
mode
parameter, with the result being assigned
to the new object. If a default ACL exists for the parent directory, the permission bits
assigned to the new object correspond to the overlapping portion of the permissions of
the
mode
parameter and those that are defined in the default ACL. The
umask
is dis-
regarded in this case.
Access Control Lists in Linux
139
Summary of Contents for LINUX ENTERPRISE DESKTOP 11
Page 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Page 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Page 10: ......
Page 29: ...Part I Authentication...
Page 30: ......
Page 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Page 126: ......
Page 127: ...Part II Local Security...
Page 128: ......
Page 158: ......
Page 173: ...Part III Network Security...
Page 174: ......
Page 194: ......
Page 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Page 210: ......
Page 228: ......
Page 229: ...Part IV Confining Privileges with Novell AppArmor...
Page 230: ......
Page 274: ......
Page 300: ......
Page 328: ......
Page 340: ......
Page 342: ......
Page 386: ......
Page 387: ...Part V The Linux Audit Framework...
Page 388: ......