
group:mascots:rwx
# effective: r-x
mask::r-x
other::---
After executing the
chmod
command to remove the write permission from the group
class bits, the output of the
ls
command is sufficient to see that the mask bits must
have changed accordingly: write permission is again limited to the owner of
mydir
.
The output of the
getfacl
confirms this. This output includes a comment for all those
entries in which the effective permission bits do not correspond to the original permis-
sions, because they are filtered according to the mask entry. The original permissions
can be restored at any time with
chmod g+w mydir
.
10.4.3 A Directory with a Default ACL
Directories can have a default ACL, which is a special kind of ACL defining the access
permissions that objects in the directory inherit when they are created. A default ACL
affects both subdirectories and files.
Effects of a Default ACL
There are two ways in which the permissions of a directory's default ACL are passed
to the files and subdirectories:
• A subdirectory inherits the default ACL of the parent directory both as its default
ACL and as an access ACL.
• A file inherits the default ACL as its access ACL.
All system calls that create file system objects use a
mode
parameter that defines the
access permissions for the newly created file system object. If the parent directory does
not have a default ACL, the permission bits as defined by the
umask
are subtracted
from the permissions as passed by the
mode
parameter, with the result being assigned
to the new object. If a default ACL exists for the parent directory, the permission bits
assigned to the new object correspond to the overlapping portion of the permissions of
the
mode
parameter and those that are defined in the default ACL. The
umask
is dis-
regarded in this case.
Access Control Lists in Linux
139
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......