
2. In the next example, use
mkdir
to create a subdirectory in
mydir
, which inherits
the default ACL.
mkdir mydir/mysubdir
getfacl mydir/mysubdir
# file: mydir/mysubdir
# owner: tux
# group: project3
user::rwx
group::r-x
group:mascots:r-x
mask::r-x
other::---
default:user::rwx
default:group::r-x
default:group:mascots:r-x
default:mask::r-x
default:other::---
As expected, the newly-created subdirectory
mysubdir
has the permissions from
the default ACL of the parent directory. The access ACL of
mysubdir
is an exact
reflection of the default ACL of
mydir
. The default ACL that this directory will
hand down to its subordinate objects is also the same.
3. Use
touch
to create a file in the
mydir
directory, for example,
touch
mydir/myfile
.
ls -l mydir/myfile
then shows:
-rw-r-----+ ... tux project3 ... mydir/myfile
The output of
getfacl mydir/myfile
is:
# file: mydir/myfile
# owner: tux
# group: project3
user::rw-
group::r-x
# effective:r--
group:mascots:r-x
# effective:r--
mask::r--
other::---
touch
uses a
mode
with the value
0666
when creating new files, which means
that the files are created with read and write permissions for all user classes, pro-
vided no other restrictions exist in
umask
or in the default ACL (see
Section
“Effects of a Default ACL”
(page 139)). In effect, this means that all access permis-
sions not contained in the
mode
value are removed from the respective ACL entries.
Access Control Lists in Linux
141
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......