Reading the DI status can be done using cat "Device profile";
DO status can be controlled by using echo 1 > "Device Profile" or echo 0 > "Device
Profile" as root user
5 Security
In this chapter, we will introduce the security mechanism of EC300, an edge
computer based on ARM architecture.
5.1 sudo mechanism
In EC300, the root user is banned for better security. Sudo is a program that lets
the system administrator allow an approved user to execute some commands as the
root user or another user. The most basic rule is to give as few privileges as
possible to get the job done. Using sudo is more secure than root session opening
for a number of reasons, including:
•
Grant privileges to normal users without having to know the root password (sudo
will prompt for the current user's password)
•
It's easy to run privileged commands via sudo, and the rest of the time, work as
an unprivileged user, reducing potential damage due to wrong operations.
5.2 Firewalls
Netfileter/iptables is an excellent and free firewall tool based on packet
filtering which comes with nuix/linux system. It is very powerful and flexible,
and can control the data packets flowing in, out and through the server in fine
detail.