Securing the File System
1. File Permissions and Ownership
Understanding File Permissions: Read, Write, Execute (r
, w
, x
):
In Linux, every file and directory has permissions that control who can read, write, and execute them. These permissions are divided into three categories:
- Read (
r
): Allows viewing the contents of a file or listing files in a directory. - Write (
w
): Allows modifying the contents of a file or adding/removing files in a directory. - Execute (
x
): Allows executing a file as a program or script, or accessing a directory.
Permissions are typically assigned to three entities:
- Owner: The user who owns the file.
- Group: The group of users who share access to the file.
- Others: All other users on the system.
Example of file permissions displayed by the ls -l
command:
$ ls -l /path/to/file
-rwxr-xr-- 1 john developers 12345 Jan 1 12:00 examplefile.txt
rwx
(Owner): The owner can read, write, and execute.r-x
(Group): The group can read and execute, but not write.r--
(Others): All others can only read the file.
Changing Ownership of Files (chown):
To change the ownership of a file or directory, use the chown command:
sudo chown john:developers /path/to/file
This command assigns the owner as john and the group as developers.
-
Changing Owner Only:
sudo chown john /path/to/file
-
Changing Group Only:
sudo chown :developers /path/to/file
Modifying File Permissions (chmod):
The chmod command allows you to change file permissions for the owner, group, and others.
Symbolic Mode:
This method uses characters (r, w, x) to modify permissions.
-
Add permissions:
sudo chmod u+x file.txt # Add execute permission to the owner.
sudo chmod g-w file.txt # Remove write permission from the group.
-
Remove permissions:
sudo chmod o-r file.txt # Remove read permission from others.
Numeric Mode:
In this mode, permissions are represented by a three-digit number where each digit is the sum of the values for r
, w
, and x
:
r = 4
w = 2
x = 1
Example:
chmod 755 file.txt
:
This means:
- Owner:
rwx
(4 + 2 + 1 = 7) - Group:
rx
(4 + 1 = 5) - Others:
rx
(4 + 1 = 5)
Command:
sudo chmod 755 file.txt
Setting Default Permissions Using umask
:
The umask
command sets the default file creation permissions for new files and directories. It defines what permissions are NOT set when a new file is created.
- Default File Creation Mode: When a file is created, it defaults to
666
(rw-rw-rw-
). - Default Directory Creation Mode: Directories default to
777
(rwxrwxrwx
).
The umask
value subtracts from these defaults. For example, a umask
of 022
would result in:
- Files:
644
(rw-r--r--
) - Directories:
755
(rwxr-xr-x
)
To check your current umask:
$ umask
022
To change the umask
temporarily:
$ umask 0777 # Set no default permissions (only root can access files).
2. Special File Permissions
Setuid, Setgid, and Sticky Bits:
-
Setuid (Set User ID):
When set on an executable file, this permission allows the file to be executed with the permissions of the file's owner rather than the user who runs it. This is useful for commands like passwd
.
Example:
sudo chmod u+s /path/to/executable
This allows the program to run with the privileges of the file owner (usually root).
-
Setgid (Set Group ID):
When applied to a file, it allows the program to run with the group permissions of the file’s group rather than the user's current group. For directories, files created within the directory inherit the group of the directory. Example:
sudo chmod g+s /path/to/directory
-
Sticky Bit:
Used on directories to restrict file deletion. Only the file's owner or root can delete files within a sticky directory, even if others have write access to the directory. Example:
sudo chmod +t /path/to/directory
Use Case Example:
The /tmp
directory often has the sticky bit set to ensure that files created by users cannot be deleted by other users.
$ ls -ld /tmp
drwxrwxrwt 14 root root 4096 Jan 1 12:00 /tmp
3. Securing Sensitive Files
Protecting /etc/passwd
, /etc/shadow
, and Other Critical System Files:
Certain files on the system are critical for security and system integrity:
/etc/passwd
: Contains user information./etc/shadow
: Contains encrypted password information.
Both files should be protected with strict permissions to prevent unauthorized access:
Example:
sudo chmod 644 /etc/passwd
sudo chmod 000 /etc/shadow
/etc/passwd
: Readable by all users but writable only by root./etc/shadow
: Should be readable and writable only by root, with permissions set to000
.
Using Access Control Lists (ACLs) to Fine-Tune Permissions:
ACLs provide more fine-grained control over file permissions. They allow you to specify permissions for individual users or groups beyond the standard owner/group/other model.
-
Setting ACL for a File:
sudo setfacl -m u:john:rwx /path/to/file
-
This gives user john read, write, and execute permissions for the specified file.
-
Viewing ACLs:
getfacl /path/to/file
4. Filesystem Encryption
Introduction to File Encryption Techniques:
Encryption protects sensitive data by converting it into unreadable ciphertext. In Linux, encryption can be used to protect files or entire directories.
GPG Encryption:
GPG allows encryption of individual files using public key cryptography.
-
Encrypt a file:
gpg -c file.txt # Encrypt using symmetric encryption
-
Decrypt the file:
gpg file.txt.gpg
EncFS:
EncFS allows the creation of an encrypted directory that is mounted to an accessible directory, providing transparency.
To create an encrypted directory:
encfs /path/to/encrypted /path/to/mountpoint
Encrypting Sensitive Files and Directories: For encrypting entire directories, you can use tools like ecryptfs or fscrypt, which integrate with the filesystem.
5. Best Practices for Securing the File System
-
Ensure Proper File Permissions on System Files:
Regularly check and secure permissions on sensitive system files, like/etc/passwd
,/etc/shadow
,/etc/sudoers
. -
Minimize Access to Critical Files:
Usechmod
,chown
, and ACLs to restrict access to sensitive files to only those who need it. -
Periodically Review File Permissions:
Regularly audit file permissions across the system, ensuring that users and groups have only the permissions necessary for their roles. -
Use Encryption:
Encrypt sensitive files and directories, particularly those containing personal information or system credentials.
Key Takeaways:
- Proper file permissions and ownership are crucial for securing sensitive data and system files.
- Special file permissions like setuid, setgid, and sticky bits add an additional layer of security.
- Protect critical files such as
/etc/passwd
and/etc/shadow
with strict access control measures. - Encryption tools like GPG and EncFS are vital for protecting data at rest.
- Regularly review file permissions and practices to ensure continued security and integrity.