Sponsored Content
Full Discussion: umask usage
Top Forums Shell Programming and Scripting umask usage Post 302518975 by Perderabo on Monday 2nd of May 2011 04:49:46 PM
Old 05-02-2011
That's just the way it works. Unix commands were setting too many bits and it was not very secure because of it. umask was conceived as a way to tighten security. You're trying to loosen security... not much demand for that.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

umask

in this unix book that i have, it says: the statement: filedes = open(pathname, O_CREAT, mode); is actually filedes = open(pathname, O_CREAT, (~mask)&mode); /* ~ is the negation symbol */ like it's doing some type of masking. for example, fd =... (1 Reply)
Discussion started by: bb00y
1 Replies

2. UNIX for Dummies Questions & Answers

umask

the umask on solaris must return 022 or 0022 wich one is correct and why? thanks, pa (2 Replies)
Discussion started by: rsh
2 Replies

3. AIX

Umask help

I changed the umask in /etc/security/user to 027. I changed the umask in /etc/profile to 027. My current shell is ksh. My .profile doesn't make any changes to umask or call other scripts that change umask. Running AIX 5.3 I still get a umask of 022 instead of the expected 027. I have no... (1 Reply)
Discussion started by: x96riley3
1 Replies

4. UNIX for Dummies Questions & Answers

umask

Hi, I have a doubt on the umask values. Why is the UMASK value is different from file and directory? Suppose if the umask value is 0022. The file permissions for a newly created file is 644 and the file permissions for a newly created directory is 755. My doubt is why can't it be the... (1 Reply)
Discussion started by: praveen_b744
1 Replies

5. HP-UX

how can I find cpu usage memory usage swap usage and logical volume usage

how can I find cpu usage memory usage swap usage and I want to know CPU usage above X% and contiue Y times and memory usage above X % and contiue Y times my final destination is monitor process logical volume usage above X % and number of Logical voluage above can I not to... (3 Replies)
Discussion started by: alert0919
3 Replies

6. Solaris

current CPU usage, memory usage, disk I/O oid(snmp)

Hi, I want to monitor the current cpu usage, monitor usage , disk I/o and network utlization for solaris using SNMP. I want the oids for above tasks. can you please tell me that Thank you (2 Replies)
Discussion started by: S_venkatesh
2 Replies

7. UNIX for Dummies Questions & Answers

Umask

I need to set a umask of 022 for my ssh sessions, or within my profile. I have set the umask in both bash_profile and bashrc. and when i run umask i get 0022 but when i create a file i get, # touch test.txt # ls -l test.txt -rw------- 1 root root 0 Apr 26 12:25 test.txt it seems like... (1 Reply)
Discussion started by: felix001
1 Replies

8. AIX

How to monitor the IBM AIX server for I/O usage,memory usage,CPU usage,network..?

How to monitor the IBM AIX server for I/O usage, memory usage, CPU usage, network usage, storage usage? (3 Replies)
Discussion started by: laknar
3 Replies

9. UNIX for Dummies Questions & Answers

Command to display the space usage (memory usage) of a specific directory.

Hi all, Can you please tell me the command, with which one can know the amount of space a specific directory has used. df -k . ---> Displays, the amount of space allocated, and used for a directory. du -k <dir name> - gives me the memory used of all the files inside <dir> But i... (2 Replies)
Discussion started by: abhisheksunkari
2 Replies

10. UNIX for Dummies Questions & Answers

Memory usage per user,percent usage,sytem time in ksh

Let's say i have 20 users logged on Server. How can I know how much memory percent used each of them is using with system time in each user? (2 Replies)
Discussion started by: roy1912
2 Replies
SECMODEL_EXTENSIONS(9)					   BSD Kernel Developer's Manual				    SECMODEL_EXTENSIONS(9)

NAME
secmodel_extensions -- Extensions security model DESCRIPTION
secmodel_extensions implements extensions to the traditional security model based on the original 4.4BSD. They can be used to grant addi- tional privileges to ordinary users, or enable specific security measures like curtain mode. The extensions are described below. Curtain mode When enabled, all returned objects will be filtered according to the user-id requesting information about them, preventing users from access- ing objects they do not own. It affects the output of many commands, including fstat(1), netstat(1), ps(1), sockstat(1), and w(1). This extension is enabled by setting security.models.extensions.curtain or security.curtain sysctl(7) to a non-zero value. It can be enabled at any time, but cannot be disabled anymore when the securelevel of the system is above 0. Non-superuser mounts When enabled, it allows file-systems to be mounted by an ordinary user who owns the point node and has at least read access to the special device mount(8) arguments. Note that the nosuid and nodev flags must be given for non-superuser mounts. This extension is enabled by setting security.models.extensions.usermount or vfs.generic.usermount sysctl(7) to a non-zero value. It can be disabled at any time, but cannot be enabled anymore when the securelevel of the system is above 0. Non-superuser control of CPU sets When enabled, an ordinary user is allowed to control the CPU affinity(3) of the processes and threads he owns. This extension is enabled by setting security.models.extensions.user_set_cpu_affinity sysctl(7) to a non-zero value. It can be disabled at any time, but cannot be enabled anymore when the securelevel of the system is above 0. SEE ALSO
affinity(3), sched(3), sysctl(7), kauth(9), secmodel(9), secmodel_bsd44(9), secmodel_securelevel(9), secmodel_suser(9) AUTHORS
Elad Efrat <elad@NetBSD.org> BSD
December 3, 2011 BSD
All times are GMT -4. The time now is 05:18 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy