Are you using Access Control Lists (ACLs) but are confused about the concept of masks? You’re not alone. Let’s dive into this important concept by taking a look at what they are and how they interact with Linux file system permissions.
This blog post will break down ACL masks and how they are important with Linux file system permissions.
- What Are ACL Masks?
- Adding a User to ACL and Understanding Masks
- Adding Another User and Modifying the Mask
- Effective Permissions and Mask Adjustment
- Default Masks for Directories
- Conclusion
Are you using Access Control Lists (ACLs) but are confused about the concept of masks? You’re not alone. Let’s dive into this important concept by taking a look at what they are and how they interact with Linux file system permissions.
What Are ACL Masks?
ACL masks ensure permissions interoperability with programs and utilities that aren’t ACL-aware.
An ACL mask on a file or directory represents the maximum permissions allowed to any user or group object that isn’t the owning user, group, or “other” class. Essentially, it translates ACL entries into POSIX permissions for backward compatibility.
Let’s examine a newly created file we’ll be working with: securedfile.txt
.
ls -l securedfile.txt
You’ll see something like this:
-rw-r--r--. 1 user group 0 Aug 23 12:34 securedfile.txt
Notice the dot (.)
after the permissions. This indicates an SELinux context, which is unrelated to ACLs or ACL masks.
To check the ACL entries for the file, use:
getfacl securedfile.txt
This will output:
# file: securedfile.txt
# owner: user
# group: group
user::rw-
group::r--
other::r--
This is a “minimal ACL,” meaning there are no extended ACL entries.
Adding a User to ACL and Understanding Masks
Let’s grant a user named manager read permissions:
setfacl -m u:manager:r securedfile.txt
ls -l securedfile.txt
getfacl securedfile.txt
You’ll now see a + sign
in the ls -l
output, indicating ACLs are present:
-rw-r--r--+ 1 user group 0 Aug 23 12:34 securedfile.txt
The getfacl
output now includes:
user::rw-
user:manager:r--
group::r--
mask::r--
other::r--
The mask::r--
line represents the maximum permissions allowed to named users or groups.
Adding Another User and Modifying the Mask
Now, let’s add another user, developer
, with read and write permissions:
setfacl -m u:developer:rw securedfile.txt
getfacl securedfile.txt
This changes the ACL:
user::rw-
user:manager:r--
user:developer:rw-
group::r--
mask::rw-
other::r--
Since we gave developer
write permissions, the mask
updated to rw-
, allowing up to read and write for named ACL users.
Effective Permissions and Mask Adjustment
We can manually adjust the mask to restrict effective permissions. Let’s set the mask to r--
(read-only):
setfacl -m m::r securedfile.txt
getfacl securedfile.txt
Now, the developer
entry shows:
user:developer:rw- #effective:r--
Even though developer
was granted rw-
, the mask limits them to r--
. The ls -l
output reflects this by showing:
-rw-r--r--+ 1 user group 0 Aug 23 12:34 securedfile.txt
To add a user while respecting the mask, use -n
:
setfacl -n -m u:williams:rwx securedfile.txt
getfacl securedfile.txt
The output will show:
user:williams:rwx #effective:r--
Since the mask is r--
, williams
only gets read permissions.
Default Masks for Directories
To apply default ACL masks for all new files in a directory:
mkdir secureddirectory
setfacl -d -m m::rX secureddirectory/
getfacl secureddirectory/
mkdir secureddirectory/securedsubdirectory/
getfacl secureddirectory/securedsubdirectory/
This ensures new files inherit the specified mask settings.
Conclusion
ACL masks ensure ACL security while maintaining compatibility with non-ACL-aware applications. They help enforce permissions boundaries effectively, ensuring system consistency while providing fine-grained access control.
Understanding and using ACL masks effectively allows you to manage file permissions with precision, ensuring both security and flexibility.
📝 For more information about Linux ACLs, please review this RedHat Blog.