# HG changeset patch # User Christian Urban # Date 1349811006 -3600 # Node ID 24116ce8c294180e40f280800ab7bb62f87bed03 # Parent e9288308dbcfe18b6b610873f0b0cf0d0f517152 tuned diff -r e9288308dbcf -r 24116ce8c294 hw03.pdf Binary file hw03.pdf has changed diff -r e9288308dbcf -r 24116ce8c294 hw03.tex --- a/hw03.tex Tue Oct 09 20:26:54 2012 +0100 +++ b/hw03.tex Tue Oct 09 20:30:06 2012 +0100 @@ -9,7 +9,7 @@ \begin{enumerate} \item What does the principle of least privilege say? -\item In which situations can the access control mechanism of Unix +\item In which of the following situations can the access control mechanism of Unix file permissions be used? \begin{itemize} @@ -21,6 +21,12 @@ \item What should be the architecture of a network application under Unix be that processes potentially hostile data? +\item How can you exploit the fact that every night root has a cron +job that delete the files in \texttt{/tmp}? + +\item What does it mean that the program \texttt{passwd} has the \texttt{setuid} +bit be set? Why is this necessary? + \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure? \end{enumerate}