[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Preparing Debian for using capabilities: file ownership.



> > > That would not be a logical step. Right now programs such as rlogin, ssh,
> > > NFS etc make sure that you cannot login as root or that root rights
> > > get smashed. If your box is cracked somehow, it often is the case that
> > > people can get any userid they like _except_ root. If the system binaries
> > > are owned by a non-root uid, that will lower security quite significantly.
> 
> On Sat, Sep 23, 2000 at 01:07:18AM -0300, Nicol?s Lichtmaier wrote:
> >  Why can't those programs be enhanced to protect the `bin' user?
> 
> For the most part, they can protect an arbitrary set of users, if
> configured properly.
> 
> However, if bin owns binaries which are run by root, you've just made it
> so that cracking bin is equivalent to cracking root.  Simple example:
> let's say that bin owns /bin/sh.  So you replace /bin/sh and wait for
> the next time root runs a shell script.
> 
> Increasing security isn't a matter of making random changes to the system.

 Your point is so obvious. duh... how did I miss that?
 Of course that cracking bin would be like cracking root...!

> > Anyway, al those protections were designed with the traditional
> > security scheme in mind. So yes, this is a real problem, and these
> > utilities should be changed.
> >
> >  Sooner or later we'll need to address all this. I can't see why don't
> > we start now.
> 
> How about figuring out what you're talking about, first?

 Allright, I drop the case.



Reply to: