In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
CTOnews.com, Sept. 19, in recent years, the upsurge of Rust refactoring has swept the entire development circle. Rust has certain advantages in terms of security, efficiency and maintainability, including Rust support for Windows and Linux kernels.
Unified Information Software announced today that the Rust version of Bash, called utshell, will be launched in the server version of UOS soon, which aims to break through the security limitations faced by traditional Shell.
CTOnews.com Note: Bash is a Shell program that is widely used in various Unix and Linux systems. It is the subsequent compatible and open source version of Bourne shell.
Tongxin software said that in Bash, there are some commands that do not check the parameters against tampering, thus bringing security risks to the system.
For example, the alias command allows users to create aliases for other commands or command sequences, but it does not check parameters against tampering, resulting in unchecked parameters that can be used to execute malicious code or perform unauthorized operations.
In order to deal with the above problems, utshell clearly defines the rules of the alias command, in order to ensure the convenience of use, and can effectively prevent the command from being maliciously tampered with, so as to limit the occurrence of malicious behavior or misoperation.
When the alias and the executable file under $PATH have the same name, only aliases and executables are allowed to match. For example, if we want to create an alias "ls", the corresponding executable command must also be "ls" and allow parameters to be added to the command so that users can personalize the command according to their own needs.
Aliases cannot be duplicated with other aliases and function names to avoid ambiguity when using aliases, so as to better ensure that the operating system can correctly understand the user's instructions and avoid confusion and misunderstanding.
Not limited to alias commands, utshell also checks all commands and regularly optimizes those commands that may be threatened by malicious tampering, such as hash and function commands.
In Bash, the mapfile command is a tool for assigning values to arrays, but it does not effectively check and control the out-of-bounds of arrays. When the number of parameters entered by the user exceeds the capacity of the array, the overflow may be mistaken for a command, thus causing potential security risks.
In order to avoid the above situation, utshell takes measures to judge the boundary of the array. For example, when too many parameters are passed in, automatically truncate or give warnings, etc., so as to ensure that only legal and expected parameters can be passed to the mapfile command.
In addition, by using Rust to reconstruct Bash,utshell, we can not only inherit the "source" security of Rust, but also achieve higher autonomy and controllability at the code level, thus improving the security and reliability of the system.
In early June, Tongxin UOS server version V20 (1060) has integrated some of the functions of utshell, providing a preliminary experience for the upcoming full version of utshell. Download address attached to CTOnews.com:
Deepin Community address:
Https://github.com/linuxdeepin/utshell
Euler Community address:
Https://gitee.com/openeuler/utshell
Dragon lizard community address:
Https://gitee.com/anolis/utshell
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.