hw04.tex
author Christian Urban <urbanc@in.tum.de>
Mon, 15 Oct 2012 13:11:55 +0100
changeset 40 11681bbf0e01
parent 39 09130eb5a9b6
child 50 33b26c8efa03
permissions -rw-r--r--
added
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
39
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     1
\documentclass{article}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     2
\usepackage{charter}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     3
\usepackage{hyperref}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     4
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     5
\begin{document}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     6
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     7
\section*{Homework 4}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     8
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
     9
\begin{enumerate}
40
Christian Urban <urbanc@in.tum.de>
parents: 39
diff changeset
    10
\item What is bad about security-by-obscurity?
39
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    11
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    12
\item In which of the following situations can the access control mechanism of Unix
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    13
file permissions be used?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    14
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    15
\begin{itemize}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    16
\item[(a)] Alice wants to have her files readable, except for her office mates.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    17
\item[(b)] Bob and Sam want to share some secret files.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    18
\item[(c)] Root wants some of her files to be public.
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    19
\end{itemize}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    20
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    21
\item What should the architecture of a network application under Unix 
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    22
be that processes potentially hostile data?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    23
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    24
\item How can you exploit the fact that every night root has a cron
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    25
job that deletes the files in \texttt{/tmp}?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    26
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    27
\item What does it mean that the program \texttt{passwd} has the \texttt{setuid}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    28
bit set? Why is this necessary?
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    29
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    30
\item (Optional) Imagine you want to atack a 
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    31
\end{enumerate}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    32
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    33
\end{document}
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    34
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    35
%%% Local Variables: 
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    36
%%% mode: latex
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    37
%%% TeX-master: t
Christian Urban <urbanc@in.tum.de>
parents:
diff changeset
    38
%%% End: