Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Due Date 11/7/2018 Purpose This assignment should give you experience in using file descriptors, open(), close(), write(), stat() and chmod(), perror(), and command line arguments.

Due Date 11/7/2018

Purpose

This assignment should give you experience in using file descriptors, open(), close(), write(), stat() and chmod(), perror(), and command line arguments.

Program

Write a C++ program that will allow you to add messages to a file that has NO permissions for any user.

A Unix system has many files that have sensitive information in them. Permissions help keep these files secure. Some files can be publicly read, but can not be altered by a regular user (ex.: /etc/passwd). Other files can't be read at all by a regular user (ex.: /etc/shadow).

The program you develop should take a message given as a command line argument and append it to a file (also specified on the command line). The file should have no permissions, both before and after the message is appended. Of course, the file should be owned by you.

Your program should also have a -c option that will clear the file before the message is appended.

Algorithm

Check to see if the output file exists. If it doesn't, create it. Life is simpler if a newly created file is closed at the end of this step.

Check the permissions of the output file. If any permissions exist, print a useful error message and exit.

Change the permissions on the file to allow writing by the user.

Open the file for output. If the "-c" command line option is present, make sure the file is truncated.

Write the message from the command line to the output file. Write an additional newline character so that the output has a nicer format.

Clear the permissions and close the file. (These two operations can be performed in either order, but the implementation is slightly different.)

Useful Hints

Don't use the command line arguments directly. Their position in the argument list may change depending on options. Create meaningful char* variables and fill these with the appropriate entries from the argument list.

Check for error values after nearly every system function call. It's a pain to set up, but it saves time in the long run.

Input

None, really. Just command line arguments.

Error Checking

If the log file cannot be opened, an appropriate error message should be printed and the program should exit. If the file has any permissions at all, the file should be rejected as insecure, and the program should exit.

Example Run

Your program executable is called "z123456" here.

% rm log % ./z123456 Usage: seclog [-c] out_file message_string where the message_string is appended to file out_file. The -c option clears the file before the message is appended % chmod u-w . % ./z123456 log "Hello" Permission denied % chmod u+w . % ./z123456 log "Hello" % ls -l total 72 ---------- 1 z123456 student 6 Sep 24 18:39 log -rwxr-xr-x 1 z123456 student 26385 Sep 24 18:38 z123456 -rw-r--r-- 1 z123456 student 2204 Sep 24 18:36 z123456.cxx -rw-r--r-- 1 z123456 student 30896 Sep 24 18:38 z123456.o % ./z123456 log "Hello" % ls -l total 72 ---------- 1 z123456 student 12 Sep 24 18:40 log -rwxr-xr-x 1 z123456 student 26385 Sep 24 18:38 z123456 -rw-r--r-- 1 z123456 student 2204 Sep 24 18:36 z123456.cxx -rw-r--r-- 1 z123456 student 30896 Sep 24 18:38 z123456.o % chmod 400 log % tail log Hello Hello % ./z123456 log "Wait, there's more" log is not secure. Ignoring. % chmod 000 log % ./z123456 log "Wait, there's more" % ls -l total 72 ---------- 1 z123456 student 31 Sep 24 18:41 log -rwxr-xr-x 1 z123456 student 26385 Sep 24 18:38 z123456 -rw-r--r-- 1 z123456 student 2204 Sep 24 18:36 z123456.cxx -rw-r--r-- 1 z123456 student 30896 Sep 24 18:38 z123456.o % chmod 400 log % tail log Hello Hello Wait, there's more % chmod 000 log % ./z123456 -c log "Clean start" % ls -l total 72 ---------- 1 z123456 student 12 Sep 24 18:41 log -rwxr-xr-x 1 z123456 student 26385 Sep 24 18:38 z123456 -rw-r--r-- 1 z123456 student 2204 Sep 24 18:36 z123456.cxx -rw-r--r-- 1 z123456 student 30896 Sep 24 18:38 z123456.o % chmod 400 log % tail log Clean start % chmod 000 log %

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

3. What are potential solutions?

Answered: 1 week ago

Question

4. I can tell when team members dont mean what they say.

Answered: 1 week ago