Security Mechanisms of UNIX Flashcards

1
Q

What are the principals in UNIX?

A

user identifies (UID) and group identifiers (GID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a user identifier?

A

each user has a unique number (16 or 32 bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a group identifier?

A

each group has a unique number (16 or 32 bit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is UID 1 - 999?

A

reserved for specific operating tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UID >= 1000

A

assigned to human users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the username and UID of the superuser?

A

root, 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a process?

A

an instance of code in execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a PID?

A

process identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what does the ssh process do?

A

offers remote login service with username/password authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the ping program do?

A

provides users with network ping facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are 4 standard attack methods with Set-User-ID programs?

A
  • memory corruption
  • command injection during sub-process invocation
  • providing an unexpected execution environment
  • race conditions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are 3 precautions you can take to prevent Set-User-ID program attacks?

A
  • programs should have set-user-if status if absolutely necessary
  • programs should drop their privileges asap
  • inputs to set-user-ID need to be checked with extreme care
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are objects (mainly)?

A

files and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the central UNIX paradigm?

A

“Everything is a file”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is an inode?

A

a data structure on a traditional unix-style file systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are hard links created with?

A

ln

17
Q

what are soft links created with?

A

ln -s

18
Q

what is an EUID?

A

a user identifier associated with the subject (process)

19
Q

when does the access control decision algorithm grant access?

A

if UID = EUID or GID 2groups(EUID) or if the ‘other’ operation bit is set