diff -r e9288308dbcf -r 24116ce8c294 hw03.tex --- a/hw03.tex Tue Oct 09 20:26:54 2012 +0100 +++ b/hw03.tex Tue Oct 09 20:30:06 2012 +0100 @@ -9,7 +9,7 @@ \begin{enumerate} \item What does the principle of least privilege say? -\item In which situations can the access control mechanism of Unix +\item In which of the following situations can the access control mechanism of Unix file permissions be used? \begin{itemize} @@ -21,6 +21,12 @@ \item What should be the architecture of a network application under Unix be that processes potentially hostile data? +\item How can you exploit the fact that every night root has a cron +job that delete the files in \texttt{/tmp}? + +\item What does it mean that the program \texttt{passwd} has the \texttt{setuid} +bit be set? Why is this necessary? + \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure? \end{enumerate}