The Linux permissions model has two special access modes called suid ( set user id) and sgid ( set group id). Linux权限模型有两个特殊的访问模式,名为suid(设置用户id)和sgid(设置组id)。
When an executable program has the suid access modes set, it will run as if it had been started by the file's owner, rather than by the user who really started it. 当可执行的程序设置为suid访问模式,它就会开始运行,好像是由文件所有者启动而不是由真正启动它的用户启动。
Given this, you will not be surprised to learn that the crontab command, like the passwd command, is an suid program that runs with root authority. 因此,与passwd命令一样,crontab命令是一个用根权限运行的suid程序。
You should have as few suid programs as possible. 您要尽量少地使用suid程序。
If the file is executable, the suid or sgid bits, if set, will be displayed as lowercase s, otherwise they are displayed as uppercase S. 如果文件是可执行的,suid或sgid位如果已设置,将会显示为小写的s,否则就显示为大写的S。
In this case, no files had the suid bit set. 在此情况下,没有文件设置了suid位。
The passwd command is one of the few that must be suid. passwd命令是少数必须为suid的命令之一。
While suid and sgid are handy, and even necessary in many circumstances, improper use of these access mode can allow breaches of a system's security. 虽然suid和sgid很便利,甚至在很多环境下是必需的,但是这些访问模式不适当的使用会造成系统安全上的漏洞。
The suid and sgid bits are set and reset symbolically using the letter s; for example, u+ s sets the suid access mode, and g-s removes the sgid mode. suid和sgid位使用字母s在符号上进行设置和重设;例如,u+s设置suid访问模式,g-s删除sgid模式。
The suid and sgid bits occupy the same space as the x bits for user and group in a long directory listing. suid和sgid位与长目录清单中用户和组的x占据相同的空间。
Next, we can try to run the program ( again without the suid bit) under strace. 接下来,我们可以试着在strace之下运行这个程序(同样不设置suid位)。
This indicates that, for this particular program, the suid and executable bits are set. 这就表示,对这个特定的程序来说,suid和可执行位已经被设置。
All the set user ID ( SUID) bit commands and programs shipped in AIX V7.1 have this feature enabled automatically, and no further configurations are required from an end user. 在AIXV7.1中,所有设置用户ID(SUID)位命令和程序都自动地启用此特性,不需要最终用户进一步配置。
SUID and SGID permissions can give all users access to specific files. SUID和SGID许可能给所有的使用者对特定的文件存取。
Historian Lawrence Suid has said that the film's action bears little more than a "remote resemblance" to the real event. 历史学家劳伦斯。苏德说过这部电影的情节与真实事件相差甚远。
In the future, this first number may be usable to allow for new files that automatically include the SUID or SGID bits. 未来,这个第一个数目可能可使用考虑到自动地包括SUID或SGID位元的新的文件。
For example, one common practice is to set the SUID bit for the KPPP Internet Connection Utility so all users can use it to dial in to the Internet. 举例来说,一个常见的做法将设定KPPP因特网连接公用程式如此所有使用者的SUID位元能使用它拨在对因特网。
One alternative is setting the SUID and the SGID permission bits for a file. 一替代选择正在置位SUID和为一个文件SGID许可位元。
These standard tools are similar in functionality, but they limit the file system integrity control to files with suid and sgid flags. 这些标准工具功能相近,但是,它们把对文件系统完整性的控制限于有suid和sgid标志的文件。
Applying data mining algorithm to intrusion detection is a major research direction in computer security. Especially, when using data mining algorithm such as association analysis, sequence mining to analyze suid programs in Unix environment, the future is much promising. 将数据挖掘方法应用于入侵检测中研究的一个重要方向是,对Unix环境下特定程序运用关联、序列等数据挖掘算法。
It is a kind of common technique for a hacker to break into remote systems and to get root privileges using buffer overflow on UNIX suid programs. 通过对UNIX的suid程序使用缓冲区溢出攻击已成为黑客入侵远程系统并获取root权限的常用技术。