Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 2 Mar 1997 22:24:27 +0800 (WST)
From:      Adrian Chadd <adrian@obiwan.aceonline.com.au>
To:        Joerg Wunsch <joerg_wunsch@uriah.heep.sax.de>
Cc:        dillon@best.net, security@freebsd.org
Subject:   Re: disallow setuid root shells?
Message-ID:  <Pine.BSF.3.95q.970302222244.2034B-100000@obiwan.aceonline.com.au>
In-Reply-To: <Mutt.19970301115804.j@uriah.heep.sax.de>

next in thread | previous in thread | raw e-mail | index | archive | help
> As Matt Dillon wrote:
> 
> >     One thing I would like to see is a mount flag to disable suid-root and
> >     sgid-wheel binaries, but allow suid-(nonroot) and sgid-(nonwheel)
> >     binaries.  Probably any ISP who runs shell accounts would love an
> >     option like that.
> 
> For what reason?  The users normally don't have a need to create
> setuid programs, so why can't you mount /home nosuid?  OTOH, system
> partitions (like /usr) are required to allow suid root binaries
> anyway.
> 
> Btw., suidperl should honor the nosuid flag.
> 

Well, thinking about it, thats right - thinking about the "bin" group
owning most binaries, if you can't get a root suid shell, get a "bin" one
*grin*.

mounting /usr/home nosuid and noexec is a bloody execellent security thing
IMHO.

Cya.

Adrian
<adrian@psinet.net.au>





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95q.970302222244.2034B-100000>