File and Directory Protections and Ownerships

Top - Help

Copyright(c), 1995 - Management Analytics and Others - All Rights Reserved



The following files are all protected 600, owned by Root, and have only 1 link: /etc/inetd.conf /etc/ttytab /etc/services /etc/hosts.equiv /etc/hosts.lpd /etc/exports
All directories owned by Root are protected so that only Root can write to them.
No directories other than /tmp and other explicitly specified directories are writable by non-owners.
No files are writable by users who don't own those files.
The following files are all protected 644, are owned by Root, and have only 1 link: /etc/utmp /etc/state /etc/motd /etc/mtab /etc/syslog.pid
The following files are all protected 2755, are owned by Root, and have only 1 link: /etc/sm /etc/sm.bak
The file /usr/kvm/crash does not have setgid privileges.
No systems files that do not require read access by users allows read access by users.
The kernel (eg. /vmunix) is owned by root, has group set to 0 (wheel on SunOS) and permissions set to 644.
/etc, /bin, /usr/etc, /usr/bin and /tmp are owned by Root and the sticky-bit is set on /tmp.
permissions on /tmp are set to drwxrwxrwt.
There are no unexpected world writable files or directories on your system. To see these files and directories use:
/bin/find / -type f -perm -22 -exec ls -l {} \;
/bin/find / -type d -perm -22 -exec ls -ld {} \;

Only files which have the SUID or SGID bit enabled do have them enabled. To list these files, type:
/bin/find / -type f \( -perm -004000 -o -perm -002000 \) -exec ls -l {} \;

The umask value for each user is set to something like 027 or 077.

With maximum value of