[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Whom the BIND newest vulnerability concerns?



On Tue, 16 Nov 1999 at 21:51:24 +1100, Herbert Xu wrote:
> Tomasz Papszun <tomek@lodz.tpsa.pl> wrote:
> >
> > Theoritically, there could be some DoS-type interference - when one
> > program would create a pid-file normally used by another program.
> > But - as you pointed out - they usually run as root so they could do
> > bigger damages if they were compromised, anyway.
> 
> Yes but when you do this, those daemons that are now group daemon and not run
> as root can create pid files for all daemons with pid files in /var/run if
> they haven't started yet.  IMHO this is undesirable and is easily avoided by
> having a subdirectory.

Having a subdir would be the best but - as I wrote yesterday - I can't
select a directory in which a pid-file is to be created. Its location
( /var/run ) is compiled into a program. At least I don't know how it
could be configured at run-time.

-- 
 Tomasz Papszun   SysAdm @ TP S.A. Lodz, Poland  | And it's only
 tomek@lodz.tpsa.pl   http://www.lodz.tpsa.pl/   | ones and zeros.


Reply to: