Lab 15 Switching Users and Setting a Umask

Goal: Become familiar with the use of several essential commands in user
identification and account switching.

System Setup: A working, installed Red Hat Enterprise Linux system with an unprivileged
user account named student with the password student and an
unprivileged user account named visitor with a password password.

Sequence 1: Switching user accounts

Instructions:

1. Switch to virtual terminal 1 (tty1) by pressing: Ctrl-Alt-F1 and log in as visitor with
the password password.

2. Record the output of the following commands:
id
uid=503(visitor) gid=508(visitor) groups=508(visitor)

pwd
/home/visitor

3. Switch to the user student by running su - student and run the commands again:
id
uid=502(student) gid=507(student) groups=507(student)

pwd
/home/student

4. Run exit to terminate student's login and return to your original visitor login.

5. Switch to the student account again, but this time run su student (without the hyphen).
Run id and pwd again:
id
uid=502(student) gid=507(student) groups=507(student)

pwd
/home/visitor

Why do these results differ from those you recorded in the previous step?

The hyphen option to su initiates a new login shell, which includes changing the CWD to
the new user's home directory and running the user's startup scripts (~/.bash_profile,
etc). When su is run without the hyphen, your UID is changed, but all other details of the
login session, including CWD and environment variables, remain the same.

6. Log out of all the shells that you used during this sequence.

Sequence 2: Using umask to set default permissions on newlycreated files

Instructions:

1. Log in to your workstation as student.

2. View your current umask.

[student@stationX ~]$ umask
0002

3. Create a couple of files and a directory (do not examine the permissions yet).

[student@stationX ~]$ touch world_readable_file1
[student@stationX ~]$ touch world_readable_file2
[student@stationX ~]$ mkdir world_readable_dir1

4. Change your umask to a more paranoid (okay, maybe you prefer the word "secure") setting.Create new files and a directory.

[student@stationX ~]$ umask 027
[student@stationX ~]$ touch restricted_file1
[student@stationX ~]$ touch restricted_file2
[student@stationX ~]$ mkdir restricted_dir1

List the files to see if you are correct:

[student@stationX ~]$ ls -ld world_readable* restricted*

drwxr-x--- 2 student student 4096 Dec 10 15:23 restricted_dir1
-rw-r----- 1 student student 0 Dec 10 15:23 restricted_file1
-rw-r----- 1 student student 0 Dec 10 15:23 restricted_file2

drwxrwxr-x 2 student student 4096 Dec 10 15:22 world_readable_dir1
-rw-rw-r-- 1 student student 0 Dec 10 15:22 world_readable_file1
-rw-rw-r-- 1 student student 0 Dec 10 15:22 world_readable_file2

5. What is the advantage of setting umask over creating files then using the chmod command?

Using umask, you leave no window of vulnerability. In fact, if you restrict enough your
umask, you can avoid any world-readable file by default.

Sequence 3: Setting a Umask

Instructions:

1. Switch to virtual terminal 1 (tty1) by pressing: Ctrl-Alt-F1

2. Log in as the user visitor with a password of password.

3. Display your current umask:

[visitor@stationX ~]$ umask

4. Below is a table of umasks. Fill in the table with the permissions of files and directories given the umask.
Umask Directory Permissions File Permissions

5. Decide on a reasonable umask for the visitor account and add the appropriate umask command to visitor's .bashrc file. Log out of the visitor account, log in again, and create a file and a directory. View the permissions. Did the directory and file permissions match your expectation? If not, revisit the table in step 4, above, and retry with a new umask.

Sequence 4: Using the Graphical User-Management Tools

Scenario: A new contractor at your office needs an account on one of the Linux systems. The username and initial password should be contractor. The account should also be a member of the web group (without changing the user's primary group!). Finally, the account should automatically expire 7 days from today.

Instructions:

1. Run System->Administration->Users and Groups and enter the root password if prompted

2. Click Add Group and enter web in the Group Name field.

3. Click Ok and return to the main Users and Groups interface

4. Click Add User, enter contractor as the username and password in the appropriate fields. Leave all other fields at their default values

5. Click Ok to return to the main Users and Groups interface

6. Select the contractor user and click Properties

7. Go to the Account Info tab and check Enable Account Expiration. Calculate the date one week from now and enter it into the Account Expires fields.

8. Go to the Groups tab, scroll to the web group and check the checkbox next to it.

9. Click Ok to return to the main Users and Groups interface.

10. Close the Users and Groups window.

Challenge Sequence 5: Automating User Creation

Scenario: You have been asked to create a large number of user accounts. Since performing repetitive tasks by hand is for chumps, you have decided to write a shell script that uses a for loop on a list of users to create the accounts, generate a random password (different for each user) and send an email notifying users of their account information.

Instructions:

1. First of all, create a file called ~/userlist, which contains the usernames you are about to create. For example, your file might look like this:

sara
harry
marion
tyrone
tappy

2. Devise a command that could be used to create a user whose name is provided by a shell variable called $NAME
/usr/sbin/useradd $NAME

3. Devise a command that generates a 10 byte long, base64-encoded, random value and a command line that stores its output in a variable called PASSWORD

HINT: This will require a command you have not seen before. Start by looking at openssl rand --help

PASSWORD=$(openssl rand -base64 10)

4. Devise a command that non-interactively changes the password of $NAME to $PASSWORD.

HINT: passwd --stdin causes passwd to accept a password on STDIN, meaning you can pass values to it over a pipe.

echo $PASSWORD | passwd --stdin $NAME

5. Devise a command line that uses the mail command to email the values of $NAME and $PASSWORD to root@example.com. The email should have the subject "Account Info".

echo "username: $NAME, password: $PASSWORD" | mail -s "Account Info"
root@example.com

6. Finally, gather all your commands within a for loop that sets the NAME variable to each line of the userlist in turn.

Your finished script should look something like this:

#!/bin/bash
# Script for creating all users defined in
# a file called ~/userlist.
for NAME in $(cat ~/userlist)
do
  /usr/sbin/useradd $NAME
  PASSWORD=$(openssl rand -base64 10)
  echo PASSWORD | passwd --stdin $NAME
  echo "username: $NAME, password: $PASSWORD" | mail -s "Account Info" root@example.com
done

Note that there are still several things that could be improved about this script. For example, passwords are being sent in unencrypted emails. Although anything more complex than what we have here would be outside the scope of this course, you are encouraged to experiment with ways to add your own improvements!

7. Test your script (be sure to use sudo or log in as root first!). Try adding -x to your shbang
if you have problems.

RH033读书笔记(14)-Lab 15 Switching Users and Setting a Umask的更多相关文章

  1. RH033读书笔记(13)-Lab 14 Network Clients

    Goal: Practice using a variety of tools to transfer files between your system and a remote system. S ...

  2. RH033读书笔记(16)-Lab 17 Installation and Administration Tools

    Lab 17 Installation and Administration Tools Goal: Become familiar with system configuration tools a ...

  3. RH033读书笔记(8)-Lab 9 Using vim

    Lab 9 Using vim Sequence 1: Navigating with vim 1. Log in as user student 2. [student@stationX ~]$ c ...

  4. RH033读书笔记(5)-Lab 6 Exploring the Bash Shell

    Lab 6 Exploring the Bash Shell Sequence 1: Directory and file organization 1. Log in as user student ...

  5. RH033读书笔记(2)-Lab 3 Getting Help with Commands

    Lab 3 Getting Help with Commands Sequence 1: Using the Help Tools 1. man -f keyword whatis keyword l ...

  6. RH033读书笔记(4)-Lab 5 File Permissions

    Lab 5 File Permissions Sequence 1: Determining File Permissions 1. What is the symbolic representati ...

  7. RH033读书笔记(3)-Lab 4 Browsing the Filesystem

    Lab 4 Browsing the Filesystem Sequence 1: Directory and File Organization 1. Log in as user student ...

  8. RH033读书笔记(7)-Lab 8 Introduction to String Processing

    Lab 8 Introduction to String Processing Sequence 1: Exercises in string processing 1. Other than the ...

  9. RH033读书笔记(6)-Lab 7 Standard I/O and Pipes

    Lab 7 Standard I/O and Pipes 1. [student@stationX ~]$ cat /proc/cpuinfo /proc/meminfo 2. [student@st ...

随机推荐

  1. JAVA Socket(多个客户同时连接,信息共享) client (java/ruby)

    第一步 充分理解Socket 1.什么是socket 所谓socket通常也称作"套接字",用于描述IP地址和端口,是一个通信链的句柄.应用程序通常通过"套接字" ...

  2. Audio Offload

    Audio Offload 音频分载,是系统将音频分载到声卡硬件进行分载处理的功能.从Windows 8开始,音频的硬件加速和分载处理又回来了.为什么说又回来了呢? 因为声卡自创通公司发明开始,相当长 ...

  3. Unity3D中的Update, FixedUpdate, LateUpdate的区别

    MonoBehaviour.Update 更新 当MonoBehaviour启用时,其Update在每一帧被调用. MonoBehaviour.FixedUpdate 固定更新 当MonoBehavi ...

  4. HTML5----响应式(自适应)网页设计

    第一步:在网页代码的头部,加入一行viewport元标签 <meta name="viewport" content="width=device-width, in ...

  5. .Net程序猿玩转Android开发---(7)相对布局RelativeLayout

                 相对布局RelativeLayout是Android布局中一个比較经常使用的控件,使用该控件能够布局出适合各种屏幕分辨率的布局,RelativeLayout採用相对位置进行 ...

  6. Windows Phone开发(48):不可或缺的本地数据库

    原文:Windows Phone开发(48):不可或缺的本地数据库 也许WP7的时候,是想着让云服务露两手,故似乎并不支持本地数据库,所有数据都上传上"云"数据库中.不过呢,在SD ...

  7. C++ Primer 学习笔记_57_类和数据抽象 --管理指针成员

    复印控制 --管理指针成员 引言: 包括指针的类须要特别注意复制控制.原因是复制指针时.一个带指针成员的指针类 class HasPtr { public: HasPtr(int *p,int i): ...

  8. Windows Phone开发(5):室内装修

    原文:Windows Phone开发(5):室内装修 为什么叫室内装修呢?呵呵,其实说的是布局,具体些嘛,就是在一个页面中,你如何去摆放你的控件,如何管理它们,你说,像不像我们刚搬进新住所,要&quo ...

  9. CTR校准

    普遍预测CTR不准,需要校准.例如.boosted trees and SVM预測结果趋于保守.即预測的概率偏向于中值:而对于NaiveBayes预測的概率,小概率趋于更小.大概率趋于更大.经常使用的 ...

  10. 初识google多语言通信框架gRPC系列(二)编译gRPC

    目录 一.概述 二.编译gRPC 三.C#中使用gRPC 四.C++中使用gRPC 无论通过哪种语言调用gRPC,都必须要编译gRPC,因为生成proto访问类时,除了产生标准的数据定义类之外,还需要 ...