device protection upon login
file contains lines which specify how the
permissions and ownership of various system files should be changed based on
the user's login device name.
Comments start with a ‘
’ and extend to
the end of the line. Blank lines or lines with only a comment are ignored.
All other lines consist of three fields delimited by whitespace.
- Login Device
- The device you have logged in on (e.g.,
- File Permission
- An octal permission number (0600), as used by
- Other devices
- The final field is a colon
:’) delimited list of devices
(e.g., “/dev/console:/dev/fd0a”). All device names are
absolute paths. A path that ends in “/*” refers to all
directory entries except “.” and “..”.
file is used by
the specified files to
the user who has performed a login. Additionally,
is used to set the
devices to the specified permission. When a user logs out,
is responsible for
performing the inverse operation, which results in the files once again
belonging to root.
Guido van Rooij