Re: Preparing Debian for using capabilities: file ownership.
> > > That would not be a logical step. Right now programs such as rlogin, ssh,
> > > NFS etc make sure that you cannot login as root or that root rights
> > > get smashed. If your box is cracked somehow, it often is the case that
> > > people can get any userid they like _except_ root. If the system binaries
> > > are owned by a non-root uid, that will lower security quite significantly.
>
> On Sat, Sep 23, 2000 at 01:07:18AM -0300, Nicol?s Lichtmaier wrote:
> > Why can't those programs be enhanced to protect the `bin' user?
>
> For the most part, they can protect an arbitrary set of users, if
> configured properly.
>
> However, if bin owns binaries which are run by root, you've just made it
> so that cracking bin is equivalent to cracking root. Simple example:
> let's say that bin owns /bin/sh. So you replace /bin/sh and wait for
> the next time root runs a shell script.
>
> Increasing security isn't a matter of making random changes to the system.
Your point is so obvious. duh... how did I miss that?
Of course that cracking bin would be like cracking root...!
> > Anyway, al those protections were designed with the traditional
> > security scheme in mind. So yes, this is a real problem, and these
> > utilities should be changed.
> >
> > Sooner or later we'll need to address all this. I can't see why don't
> > we start now.
>
> How about figuring out what you're talking about, first?
Allright, I drop the case.
Reply to: