Book Image

Practical Linux Security Cookbook

By : Michael A Lindner, Tajinder Kalsi
Book Image

Practical Linux Security Cookbook

By: Michael A Lindner, Tajinder Kalsi

Overview of this book

With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system. Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security. With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems.
Table of Contents (17 chapters)
Practical Linux Security Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Implementing access control list (ACL)


Implementing the basic file permissions using chmod is not enough, so we can use ACLs. In addition to providing permissions for the owner and group of a particular file, we can set permissions for any user, user group, or group of all the users who are not in a group of a particular user using ACLs.

Getting ready

Before starting with the setting of permissions using ACLs, we need to confirm whether ACLs are enabled or not. We can do this by trying to view the ACLs for any file, as shown in this example:

getfacl<filename>

The preceding command will show an output similar to the following if the ACLs are enabled:

How to do it…

To understand more about ACLs, let's perform these steps:

  1. First, we will create three users and give them names—user1, user2, and user3:

    The preceding command is used to change the password information, which is optional. You can ignore it if you want to. However, in this case, you will need to log in with the password of a particular...