File permissions in Linux

Thursday, 29 November 2007, adz

In our “Advanced Console Tricks” series we have already covered subjects like Getting help and Processes management. Now it’s time to understand how the file permissions work. In this article we’re going to cover topics such as the basics of Linux file access rights, useful commands that allow you to manage file permissions, as well as numerical and special access modes.

1. Basics

From its beginnings, UNIX was multi-user environment. This feature enforced the implementation of some security mechanisms to secure data and the whole system from unauthorized access. The standard solution is DAC (Discretionary Access Control). In DAC, it is the user’s task to decide on the access rights for files. Due to operating systems development, this model become insufficient. New models were introduced, like MAC (Mandatory Access Control), ACL (Access Control List), and their implementations such as SELinux, TrustedBSD, Trusted Solaris.

2. File owner

Usually, the file owner is the user that has created the file. In UNIX-like operating systems, all files have two owners: user and group. Owners need not be a pair, user doesn’t have to be a group member. But usually it is the case that user belongs to the group that own the file. If a user is neither an owner nor the group owning the file member, it is treated as other. Each user has a designated UID number (user identification number). This enables the system to recognize the user. Root has UID=0 and the last possible number is designated for “nobody” user (for Ubuntu it is 65534, for NetBSD — 32767). Consequently, access rights are UID dependent (not user name dependent). For example, in some systems (e.g. NetBSD) we have root account with UID=0 (that is the second superuser account). Each group has a distinct GID (group identification number). To display the file owner you may use the ls command with -l option.

$ ls -l
razem 1822
drwxr-xr-x  3 adam adam    120 2007-09-03 16:00 Desktop
-rw-r--r--  1 adam adam    400 2007-08-22 18:49

The third and fourth column mean that the user and group own the file.

2.1. chgrp

This is the command that enables changing the group of the file owner. If it is used by an ordinary user, this user must be the file owner and a member of the group he is willing to give access rights to. The interesting fact here is that the user need not to be a member of the group to actually own the file. The syntax is following: chgrp new-group files, you may use a group name or its GID here.

$ ls -l
-rw-r--r--  1 adam root      0 2007-09-03 15:33 file.txt
$ chgrp users file.txt 
$ ls -l
-rw-r--r--  1 adam users      0 2007-09-03 15:33 file.txt

The command might be used with the -R option. It enables recursive group changes for all files and sub-directories. It acts similar to commands described earlier (rm, ls).

2.2. chown

This command is used to change owner and group that own the file. In most systems only root can do this. This command has the following syntax: chown new user:new group files. As in the chgrp command, you may use user and group names or just simply use their UID and GID numbers. The command does not check if given numbers are correct so you can use Kids and GIDs of nonexistent users and groups.

$ ls -l
-rw-r--r--  1 adam users      0 2007-09-03 15:33 file.txt
root@laptop:# chown root:root file.txt 
adam@laptop:~$ ls -l
-rw-r--r--  1 root root      0 2007-09-03 15:33 file.txt

Changes the group and the file owner.

root@laptop:# chown zoidberg file.txt

Changes the file owner for user named zoidberg, group is left without any changes.

# chown :futurama file.txt

Changes group for the group named futurama, owner is left without any changes. Chown enables recursive owner’s change when used with option -R.

3. Access rights

In each UNIX-like system we have three kinds of access rights: read (r), write (w) and execute (x).

Access right file directory
r Read of the file content. Display content of the directory (e.g. with the command ls).
w Write to the file. Modify the directory content.
x The right to execute file. The possibility to enter the directory using the cd command.

When we analyze the access rights to directories we should remember that we work with files including the names of files put into them and the information about their localization on a disk. To view directory content with the ls command (without any options), it is enough to have the read rights only, but usage of ls -l needs write and execute rights, since this command enforces invisible directories change. Generally speaking, each action on a directory (except simple viewing its content) needs execution rights. Owning execution rights in the case of directories enables access to their content using file names.

drw-r--r--  2 adam adam      96 2007-09-05 18:04 blob
drwxr-xr-x  2 adam adam     176 2007-09-04 15:57 tapety
-rw-r--r--  1 adam adam     125 2007-08-29 18:31

Access rights might be viewed using ls command with option -l. The first column shows the file type (first character) and the access rights (next 9 characters). First 3 characters are user access rights, named u after user, next 3 are the group access rights named g after group, and the last 3, other access rights, are marked as o after others.

In the example presented above, blob is a directory, the owner has the right to read and write, but is doesn’t have the right to execute (rw-), the group has the right to read (r), and others have only the right to read(r). Tapety is also a directory, to which owner has the full access right (rwx), the group has the right to read and execute (r-x), and others are able to read and execute (r-x).

3.1. chmod

It is the command for changing the access rights. Its syntax is following:

chmod access rights files

To give a command you should pick the class of users to whom we want to change access rights (ugo). There is an additional class, a (all). The next step is to pick one of three operators: + gives the right, - takes the right back, and = assigns the right. And in the last step you should give the type of access right (rwx).

$ chmod u+x

The user gets execution right to the file

$ chmod go-r raport.odt

Group and other users will loose the read rights to file raport.odt.

$ chmod a=w finanse.ods

All the classes of user get write right to the file finanse.ods, if one of the classes had read and execute right it would be taken of.

$ chmod u+rwx,g+rwx,o+x

User and group get the full access right, others get only the right to execute the file

3.2. Numerical access modes

To simplify the command chmod we may use numerical access rights. Each mode has the numerical value assigned. Using binary notation, it is the case that having the access right is marked as a 1 or a lack of it and is marked as 0. So the access right rwx r-x r-x would be written in binary notation as 111 101 101. Binary notation is not comfortable to use, so it is changed to an eight digit system. The access rights from our example will be written as 755, because 111 is 7 in the eight digit system, and 101 is 5. This method is not as that easy, even for an experienced user, but it is the most simple way to use chmod. You should only remember that the right to read only (r--) is 4, to write only (-w-) is 2, and to execute only (--x) is 1. Now writing down the access right it is enough to give a sum of rights for a given class.

In symbols In numbers
--x 1
-w- 2
-wx 3
r-- 4
r-x 5
rw- 6
rwx 7


$ chmod u=rwx,g=rwx,o=x

would be the same as:

$ chmod 771

3.3. Special access modes

There were few special modes developed that enriches standard ones.

3.3.1. X

This assigns to the selected classes the right to execute for a given files if and only if this right was assigned other access classes.

$ ls -l
-rwx------  1 adam users        14 2007-09-10 21:48
drwx------  1 adam users        14 2007-09-10 21:48 tapety
-rw-------  1 root users      3665 2007-09-17 17:23 wynik.txt
$ chmod go+X *
$ ls -l
-rwxr-xr-x  1 adam users        14 2007-09-10 21:48
drwxr-xr-x  1 adam users        14 2007-09-10 21:48 tapety
-rw-r--r--  1 adam users      3665 2007-09-17 17:23 wynik.txt

Without the X option the file wynik.txt would receive the execution right.

3.3.2. Sticky bit

This kind of access right, when set in the executable file case, results in storing this file in operational memory after a program has stopped working. This option is rarely used nowadays. It was designed to decrease the costs of starting popular programs. This options set for a directory enable deleting the directory contents only for a user of the directory, content file owner or root.

drwxrwxrwt  10 root root   464 2007-09-20 12:45 tmp

Sticky bit is sometimes used for the /tmp directory, which — according to the convention — should be available for all, but users should not have the right to delete files, which they do not own.

Sticky bit for a directory is set using the command chmod:

# chmod u+t test/ 
# ls -l
drwxrwxrwt  2 adam users        48 2007-09-20 15:28 test

Or (using numbers):

# chmod 1000 test/

3.3.3. setuid

Setuid for executable files results in running a given program with rights of the file owner (not user, that runs the program). Some administration commands, for example sudo, might need to be set for this mode to work properly.

$ ls -l /usr/bin/ | grep sudo
-rwsr-xr-x 1 root   root      91508 2006-10-09 13:37 sudo

Setuid mode is set by command chmod, using symbols or numbers.

# chmod u+s program
# chmod 4000 program

3.3.4. setgid

Setgid mode works just like setuid with one exception, it is run on the rights of file owners’ group. In case of directories the group that owns newly created file would be group owning a given directory (not the group of user that created the file). To set setgid mode the commandchmod is used.

# chmod g+s test/
# chmod 2000 test/
# ls -l
drwxrwsrwt  2 adam adam        48 2007-09-20 15:28 test

3.4. umask

The umask command is used to set default access mode for all newly created files. Its option consist of the access rights (written numerically) that will not be assigned. The access mode is set performing the binary operation:

default value AND NOT (umask value)

Simply speaking: it is enough to subtract umask value from the default mode expressed in eight digit system (default value is 666).

$ umask
$ touch file
$ ls -l
-rw-r--r--  2 adam adam        48 2007-09-20 15:28 file
umask 0111
$ ls -l
-rw-rw-rw-  1 adam adam         0 2007-09-20 17:31 file2

This article is part of the Command line tricks series, season II. Read the previous article of the series: Processes in Linux »

Translated by Paweł Łupkowski, Proof-read by fgibbs

Subscribe to RSS feed for this article!


fold this thread Marc Perkek  Wednesday, 5 December 2007 o godz. 3:01 pm #  Add karma Subtract karma  --3

Linux file permission are poor at best. Having started with Novell Netware I doubt Linux will catch up with where Novell was 18 years ago, or even where Windows NT was. The Linux world just doesn’t understand security.

(Comments wont nest below this level)
fold this thread michuk  Wednesday, 5 December 2007 o godz. 3:09 pm #  Add karma Subtract karma  +0

What you said is like looking at the Windows control panel and commiting statements about its kernel.

Come on, it’s an introductory article for a newcomer!

Ever heard of SELinux? Novell App Armour? Or you’re just throwing words without performing a basic reseach?

fold this thread Leo  Tuesday, 5 February 2008 o godz. 4:07 pm #  Add karma Subtract karma  +0

Please elaborate a little.

fold this thread comichio  Thursday, 6 December 2007 o godz. 1:52 am #  Add karma Subtract karma  +0

its seems to me that all this stuff about file permissions its a zillion years old, i mean when are we going to read something about MAC? or even acls? i have never found something like the freebsd handbook in the linux world.

(Comments wont nest below this level)
fold this thread zly  Saturday, 22 December 2007 o godz. 11:03 pm #  Add karma Subtract karma  +0

Good article.
You could have elaborated a bit on ACL with example usage of setfacl and getfacl for more fine tuned control though.

(Comments wont nest below this level)
fold this thread hd74  Friday, 28 December 2007 o godz. 3:07 pm #  Add karma Subtract karma  +0

Good article! Helped me much! I’m a newbie to Linux and this was exactly the information I was looking for! Thanks!!

(Comments wont nest below this level)
fold this thread rikerkrikerv  Sunday, 6 May 2012 o godz. 7:42 am #  Add karma Subtract karma  +0

Or only when it’s in time for them to the song you will be listening to… AWESOME grandioso tutorial gracias!!! Stunning! Lovely! Something diverse effectsThis could it be
[url=]more info[/url]
more info
yaaaaaaaaah. agreed. I have numerous injury stories to express to its very funny Hey, fantastic tutorial Might you give a video release The 1st sunny day it is warm enough for being outside with out using jacket on inside spring. The full city is due to a excellent mood. Everyone discovers excuses to get outside, everyone is actually smiling. Awesome!:)

(Comments wont nest below this level)
fold this thread Sam Milburn  Monday, 13 May 2013 o godz. 6:46 pm #  Add karma Subtract karma  +0

Hair typically grows all over the human body. Hair can become more visible during and after puberty and men tend to have thicker, more visible body hair than women. Both men and women have visible hair on the head, eyebrows, eyelashes, armpits, pubic region, arms, and legs; and men also have thicker hair on their face, abdomen, back and chest. Hair does not generally grow on the palms of the hands, the lips, certain areas of the genital structure, or the soles of the feet.[`^

Enjoy your day

(Comments wont nest below this level)
fold this thread Overdrawn Directors Loan Account  Friday, 16 May 2014 o godz. 11:46 pm #  Add karma Subtract karma  +0

Can turn violent because he feels omnipotent and immune to the consequences of his
actions. As such, they cannot be taxed federally since they
have seceded from the Federal Government. The tax systems vary greatly and can be progressive,proportional,
or regressive, dependent on the type of tax.

(Comments wont nest below this level)
fold this thread microsoft point gratuit final fantasy 10 mars sigil  Sunday, 18 May 2014 o godz. 1:16 pm #  Add karma Subtract karma  +0

CBS had the exclusive broadcast rights to NFL games with the AFL games on NBC in those days.
They are serving a Mother’s Day Champagne Brunch Buffet from 11:00 A.
Neither backwards, nor forwards skating in the clockwise direction to retrieve a dropped star
is allowed. Swann had only 4 catches, but for a whopping 161 yards and a touchdown. in elucidating the meaning
of that particular passage, or in resolving questions or doubts concerning the topic addressed.
It was later found that the pilot of the plane had cocaine and
alcohol in his system. Race car driver Dale Earnhardt died suddenly in a February 2001 crash while
racing in the Daytona 500.

(Comments wont nest below this level)
fold this thread carpet washing services  Friday, 23 May 2014 o godz. 12:19 am #  Add karma Subtract karma  +0

Quality articles or reviews is the main
to be a focus for the visitors to pay a visit
the website, that’s what this site is providing.

(Comments wont nest below this level)
fold this thread Télécharger minecraft gratuit  Saturday, 16 August 2014 o godz. 4:39 am #  Add karma Subtract karma  +0

Thanks tο mү father who shared ԝith me about this weblog, this website іs really awesome.

(Comments wont nest below this level)
fold this thread Abercrombie 2014  Tuesday, 23 September 2014 o godz. 12:50 am #  Add karma Subtract karma  +0

I was wondering if you ever thought of changing the structure of your website?
Its very well written; I love what youve got to say. But maybe you
could a little more in the way of content so people
could connect with it better. Youve got an awful lot of text for only having 1 or two images.
Maybe you could space it out better?

(Comments wont nest below this level)
Name (required)
E-mail (required - never shown publicly)

Adjust field size: shrink | enlarge)

You can use simple HTML in your comments. Some examples are as follows:
  • A hyperlink: <a href="">GNU/Linux for everyone!</a>,
  • Strong text: <strong>Strong text</strong>,
  • Italic text: <em>italic text</em>,
  • Strike: <strike>strike</strike>,
  • Code: <code>printf("hello world");</code>,
  • Block quote: <blockquote>Block quote</blockquote>