From owner-freebsd-security Mon Jul 15 08:00:47 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id IAA15551 for security-outgoing; Mon, 15 Jul 1996 08:00:47 -0700 (PDT) Received: from umbc7.umbc.edu (pauld@f-umbc7.umbc.edu [130.85.3.7]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id IAA15537 for ; Mon, 15 Jul 1996 08:00:40 -0700 (PDT) Received: (from pauld@localhost) by umbc7.umbc.edu (8.6.12/Umbc) id LAA09641; Mon, 15 Jul 1996 11:00:24 -0400 Date: Mon, 15 Jul 1996 11:00:23 -0400 (EDT) From: Paul Danckaert To: Mike Newell cc: jbhunt , freebsd-security@freebsd.org, root@mercury.gaianet.net Subject: Re: New EXPLOIT located! In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Mon, 15 Jul 1996, Mike Newell wrote: > On Mon, 15 Jul 1996, Paul Danckaert wrote: > > > The normal policy we use when setting up machines here is to do a find > > for suid and sgid files on the system. Pick off the essential ones, and > > strip the bits off any others. Its saved us from several irix and sun > > holes in the past.. and one or two bsd ones now too. > > What do you consider "essential ones"? I realize that a case-by-case > analysis of the pros/cons of what to/not keep SUID would be a book in > itself [:-)], especially since the usefulness of each is dependent on what > the system is being used for. However it would be nice to know what > utilities *must* be SUID for a baseline system, and especially what > utilities are "safely" SUID and what aren't. Well, the case-by-case basis of it makes it sort of difficult to come up with a real list. Some things I am unsure of, since I don't know if they will adversely affect the system.. but in general PPP/slip (ppp{,d}, sliplogin) Multicast (mrinfo,mrtrace) SuidPerl (sperl*, suidperl*) Rdist (I run usc's rdist) timed (timedc.. I run xntpd anyway.) mount_* commands If its a server box, and doesn't have to be very user friendly, I take a more restrictive approach and nuke things like at{,q,rm}, lock, and things like that. Now, I'm sure that most of these are safe.. however, if they are not necessary for the system to run, and I don't use them, I don't see the point of leaving them suid root. After all, I can make them suid later if I need them.. One question I do have, on an unrelated topic, is if people have a way of setting up a box so people can't just ^C the boot, and get a root prompt? Perhaps putting a trap in the rc scripts, or something else? paul