Unix security
This article needs additional citations for verification. (September 2014) |
It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it. This message has remained in place for seven days, so the article may be deleted without further notice. Find sources: "Unix security" – news · newspapers · books · scholar · JSTOR Nominator: Please consider notifying the author/project: {{subst:proposed deletion notify|Unix security|concern=The article does not contain anything even near to good overview of the security. It could be misleading and it is not written in encyclopedic style.}} ~~~~ Timestamp: 20240413182930 18:29, 13 April 2024 (UTC) Administrators: delete |
Unix security refers to the means of securing a Unix or Unix-like operating system.
Design concepts
Permissions
A core security feature in these systems is the file system permissions. All files in a typical Unix filesystem have permissions set enabling different access to a file. Unix permissions permit different users access to a file with different privilege (e.g., reading, writing, execution). Like users, different user groups have different permissions on a file.
User groups
Many Unix implementations add an additional layer of security by requiring that a user be a member of the wheel user privileges group in order to access the su
command.[1]
Root access

Most Unix and Unix-like systems have an account or group which enables a user to exact complete control over the system, often known as a root account. If access to this account is gained by an unwanted user, this results in a complete breach of the system. A root account however is necessary for administrative purposes, and for the above security reasons the root account is seldom used for day to day purposes (the sudo program is more commonly used), so usage of the root account can be more closely monitored. [citation needed]
User and administrative techniques
Passwords
Selecting strong passwords and guarding them properly are important for Unix security. [citation needed]
On many UNIX systems, user and password information, if stored locally, can be found in the /etc/passwd
and /etc/shadow
file pair.
Software maintenance
Patching
Operating systems, like all software, may contain bugs in need of fixing or may be enhanced with the addition of new features; many UNIX systems come with a package manager for this. Patching the operating system in a secure manner requires that the software come from a trustworthy source and not have been altered since it was packaged. Common methods for verifying that operating system patches have not been altered include the use of the digital signature of a cryptographic hash, such as a SHA-256 based checksum, or the use of read-only media.[citation needed]
Viruses and virus scanners
There are viruses and worms that target Unix-like operating systems. In fact, the first computer worm—the Morris worm—targeted Unix systems.
There are virus scanners for UNIX-like systems, from multiple vendors.
Firewalls
Network firewall protects systems and networks from network threats which exist on the opposite side of the firewall. Firewalls can block access to strictly internal services, unwanted users and in some cases filter network traffic by content.[citation needed]
iptables
![]() | This This section may contain an excessive amount of intricate detail that may interest only a particular audience.(2024-04-13) |
![]() | This section's factual accuracy may be compromised due to out-of-date information. The reason given is: Iptables is no longer the "current interface". (January 2014) |
iptables is the current user interface for interacting with Linux kernel netfilter functionality. It replaced ipchains. Other Unix like operating systems may provide their own native functionality and other open source firewall products exist.
References
- ^ Levi, Bozidar (2002). UNIX Administration: A Comprehensive Sourcebook for Effective Systems and Network Management. CRC Press. p. 207. ISBN 0-8493-1351-1.
General
- Practical UNIX and Internet Security, Simson Garfinkel and Gene Spafford, O'Reilly & Associates, 2003.
External links
- The Unix Security Model for web server administration Archived 2006-10-04 at the Wayback Machine Robert K. Moniot 2000
- An Architectural Overview of UNIX Network Security Robert B. Reinhardt 1993
- Unix security papers