|
BugTraq
cdrecord local root exploit Sep 10 2004 01:30AM newbug Tseng (newbug chroot org) (1 replies) Re: cdrecord local root exploit Sep 12 2004 05:10PM Sean Davis (dive endersgame net) (1 replies) Re: cdrecord local root exploit Sep 14 2004 01:51AM Volker Kuhlmann (list0570 paradise net nz) (2 replies) Re: cdrecord local root exploit Sep 15 2004 03:48PM Coleman (cokane cokane org) (1 replies) Re: cdrecord local root exploit Sep 16 2004 05:57PM Jason T. Miller (jasomill shaffstall com) (1 replies) Re: cdrecord local root exploit Sep 27 2004 07:49AM Dr Andrew C Aitchison (A C Aitchison dpmms cam ac uk) (1 replies) Re: cdrecord local root exploit Sep 28 2004 06:22AM Jason T. Miller (jasomill shaffstall com) (1 replies) |
|
Privacy Statement |
> Subject: Re: cdrecord local root exploit
>
> The notion that a program must be root if an ordinary user doesn't have
> the necessary permissions by default is a dangerous one.
Very well said.
I really liked your way of presenting the idea of a setuid proxy too.
Not very many texts on secure programming techniques are so lucid.
Even those of us who've been trying to practice secure programming
techniques (esp. on unix-like systems, i.e. those using setuid), have
had tremendous difficulty implementing the principle of least privilege.
I can usually get as far as designing my code in the manner of your
outline for something like cdrecord where a program needs certain
privileges to open a device file and where only certain users should be
allowed to run that program.
However with the limitations of file and process ACL technology present
in most unix-like systems following this principle gets a lot more
difficult if, for example, you want to have a second limited group of
users be able to write to a configuration file for the program, but not
make it possible for the program itself to write to any of its
configuration files (e.g. if it were to suffer a buffer overflow and
give its privileges to an attacker). As far as I've ever been able to
figure out it's almost impossible to do this on unix-like systems if you
also need to protect the content of the configuration file from prying
eyes (i.e. not be "other"-readable). It might be possible to do
relatively safely with a pair of communicating front-end/back-end setuid
proxy programs, providied they can have hard-coded group-ID numbers (and
provided the host system implements multi-group membership for
processes). Such complexity though is an enemy of security.
--
Greg A. Woods
Planix, Inc.
<woods (at) planix (dot) com [email concealed]> +1 416 489-5852 x122 http://www.planix.com/
[ reply ]