1NTFS-3G.SECAUDIT(8)         System Manager's Manual        NTFS-3G.SECAUDIT(8)
2
3
4

NAME

6       ntfs-3g.secaudit - NTFS Security Data Auditing
7

SYNOPSIS

9       ntfs-3g.secaudit [options] args
10
11       Where options is a combination of :
12              -a full auditing of security data (Linux only)
13              -b backup ACLs
14              -e setting extra backed-up parameters (in conjunction with -s)
15              -h displaying hexadecimal security descriptors saved in a file
16              -r recursing in a directory
17              -s setting backed-up ACLs
18              -v verbose (very verbose if set twice)
19
20       and args define the parameters and the set of files acted upon.
21
22       Typing  secaudit  with  no  args  will  display  a summary of available
23       options.
24

DESCRIPTION

26       ntfs-3g.secaudit displays the ownership and permissions  of  a  set  of
27       files  on  an NTFS file system, and checks their consistency. It can be
28       started in terminal mode only (no graphical user  interface  is  avail‐
29       able.)
30
31       When  a volume is required, it has to be unmounted, and the command has
32       to be issued as root. The volume can be either a block device  (i.e.  a
33       disk partition) or an image file.
34
35       When  acting on a directory or volume, the command may produce a lot of
36       information. It is therefore advisable to redirect the output to a file
37       or pipe it to a text editor for examination.
38

OPTIONS

40       Below  are  the  valid  combinations  of  options  and  arguments  that
41       ntfs-3g.secaudit accepts. All the indicated arguments are mandatory and
42       must  be  unique  (if wildcards are used, they must resolve to a single
43       name.)
44
45       -h file
46              Displays in an human  readable  form  the  hexadecimal  security
47              descriptors  saved  in  file. This can be used to turn a verbose
48              output into a very verbose output.
49
50       -a[rv] volume
51              Audits the volume : all the global security data on  volume  are
52              scanned  and  errors are displayed. If option -r is present, all
53              files and directories are also scanned and  their  relations  to
54              global  security  data  are  checked.  This can produce a lot of
55              data.
56
57              This option is not effective on volumes formatted for  old  NTFS
58              versions  (pre  NTFS  3.0). Such volumes have no global security
59              data.
60
61              When errors are signalled, it is advisable to repair the  volume
62              with an appropriate tool (such as chkdsk on Windows.)
63
64       [-v] volume file
65              Displays the security parameters of file : its interpreted Linux
66              mode (rwx flags in octal) and Posix ACL[1], its security key  if
67              any, and its security descriptor if verbose output.
68
69       -r[v] volume directory
70              displays the security parameters of all files and subdirectories
71              in directory : their interpreted Linux mode (rwx flags in octal)
72              and  Posix ACL[1], their security key if any, and their security
73              descriptor if verbose output.
74
75       -b[v] volume [directory]
76              Recursively extracts to standard output the NTFS ACLs  of  files
77              in volume and directory.
78
79       -s[ev] volume [backup-file]
80              Sets  the  NTFS  ACLS  as  indicated  in backup-file or standard
81              input. The input data must have  been  created  on  Linux.  With
82              option   -e,  also  sets  extra  parameters  (currently  Windows
83              attrib).
84
85       volume perms file
86              Sets the security parameters of file  to  perms.  Perms  is  the
87              Linux  requested  mode (rwx flags, expressed in octal form as in
88              chmod) or a Posix ACL[1] (expressed like in  setfacl  -m).  This
89              sets a new ACL which is effective for Linux and Windows.
90
91       -r[v] volume perms directory
92              Sets  the security parameters of all files and subdirectories in
93              directory to perms. Perms  is  the  Linux  requested  mode  (rwx
94              flags,  expressed  in octal form as in chmod), or a Posix ACL[1]
95              (expressed like in setfacl -m.) This sets  new  ACLs  which  are
96              effective for Linux and Windows.
97
98       [-v] mounted-file
99              Displays  the  security  parameters of mounted-file : its inter‐
100              preted Linux mode (rwx flags in octal)  and  Posix  ACL[1],  its
101              security key if any, and its security descriptor if verbose out‐
102              put. This is a special case which acts on  a  mounted  file  (or
103              directory) and does not require being root. The Posix ACL inter‐
104              pretation can only be displayed if the full path to mounted-file
105              from the root of the global file tree is provided.
106

NOTE

108       [1] provided the POSIX ACL option was selected at compile time. A Posix
109       ACL specification looks like "[d:]{ugmo}:[id]:[perms],..." where id  is
110       a  numeric user or group id, and perms an octal digit or a set from the
111       letters r, w and x.
112              Example : "u::7,g::5,o:0,u:510:rwx,g:500:5,d:u:510:7"
113

EXAMPLES

115       Audit the global security data on /dev/sda1
116
117              ntfs-3g.secaudit -ar /dev/sda1
118
119       Display the ownership and permissions parameters for files in directory
120       /audio/music on device /dev/sda5, excluding sub-directories :
121
122              ntfs-3g.secaudit /dev/sda5 /audio/music
123
124       Set  all  files in directory /audio/music on device /dev/sda5 as write‐
125       able by owner and read-only for everybody :
126
127              ntfs-3g.secaudit -r /dev/sda5 644 /audio/music
128
129

EXIT CODES

131       ntfs-3g.secaudit exits with a value of 0 when no  error  was  detected,
132       and with a value of 1 when an error was detected.
133

KNOWN ISSUES

135       Please see
136
137              http://www.tuxera.com/community/ntfs-3g-faq/
138
139       for  common questions and known issues.  If you would find a new one in
140       the latest release of the software then please send an email describing
141       it   in   detail.   You   can  contact  the  development  team  on  the
142       ntfs-3g-devel@lists.sf.net address.
143

AUTHORS

145       ntfs-3g.secaudit has been developed by Jean-Pierre André.
146

THANKS

148       Several people made heroic efforts, often over five or more years which
149       resulted  the  ntfs-3g  driver.  Most  importantly they are Anton Alta‐
150       parmakov, Richard Russon, Szabolcs Szakacsits,  Yura  Pakhuchiy,  Yuval
151       Fledel,  and  the author of the groundbreaking FUSE filesystem develop‐
152       ment framework, Miklos Szeredi.
153

SEE ALSO

155       ntfsprogs(8), attr(5), getfattr(1)
156
157
158
159ntfs-3g.secaudit 1.3.8           February 2010             NTFS-3G.SECAUDIT(8)
Impressum