HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
5.1.5 Locating and Correcting File Corruption Using fsck......................................90
5.2 Setting Access Control Lists.....................................................................................91
5.3 Using HFS ACLs......................................................................................................91
5.3.1 HFS ACLs and HP-UX Commands and Calls.................................................93
5.4 Using JFS ACLs........................................................................................................95
5.4.1 Definition of a JFS ACL....................................................................................95
5.4.2 How the System Generates a JFS ACL............................................................96
5.4.3 Minimal JFS ACL.............................................................................................96
5.4.4 Additional JFS ACL user and group Entries...................................................96
5.4.5 JFS ACL group and class Entries.....................................................................97
5.4.6 Using the setacl and getacl Commands...........................................................97
5.4.7 Effect of chmod on class Entries......................................................................97
5.4.8 Example of Changing a Minimal JFS ACL......................................................98
5.4.9 Default JFS ACLs.............................................................................................99
5.4.10 Changing JFS ACL with the setacl Command.............................................100
5.4.10.1 Using the Modify and Delete Options.................................................100
5.4.10.2 Using the -f Option..............................................................................101
5.4.10.3 Effective Permissions and setacl -n......................................................101
5.5 Comparison of JFS and HFS ACLs........................................................................102
5.5.1 JFS and HFS Command and Function Mapping...........................................102
5.6 ACLs and NFS........................................................................................................103
5.7 Security Considerations for /dev Device Special Files...........................................103
5.8 Protecting Disk Partitions and Logical Volumes...................................................104
5.9 Security Guidelines for Mounting and Unmounting File Systems.......................105
5.10 Controlling File Security on a Network...............................................................106
5.10.1 Check Permission Settings on Network Control Files.................................106
5.10.2 Files Mounted in an NFS Environment.......................................................107
5.10.2.1 Server Vulnerability.............................................................................107
5.10.2.2 Client Vulnerability..............................................................................107
5.10.2.3 How to Safeguard NFS-Mounted Files................................................108
6 Compartments..................................................................................................................109
6.1 Overview................................................................................................................109
6.1.1 Compartment Architecture............................................................................109
6.1.2 Default Compartment Configuration............................................................111
6.2 Planning the Compartment Structure....................................................................111
6.3 Compartment Components...................................................................................112
6.3.1 Compartment Configuration Files.................................................................112
6.3.2 Compartment Commands.............................................................................113
6.3.3 Compartment Manpages...............................................................................113
6.4 Compartment Rules and Syntax............................................................................114
6.4.1 Compartment Definition................................................................................114
6.4.2 File System Rules...........................................................................................115
6 Table of Contents