Date: Sun, 2 Mar 1997 22:24:27 +0800 (WST) From: Adrian Chadd <adrian@obiwan.aceonline.com.au> To: Joerg Wunsch <joerg_wunsch@uriah.heep.sax.de> Cc: dillon@best.net, security@freebsd.org Subject: Re: disallow setuid root shells? Message-ID: <Pine.BSF.3.95q.970302222244.2034B-100000@obiwan.aceonline.com.au> In-Reply-To: <Mutt.19970301115804.j@uriah.heep.sax.de>
next in thread | previous in thread | raw e-mail | index | archive | help
> As Matt Dillon wrote: > > > One thing I would like to see is a mount flag to disable suid-root and > > sgid-wheel binaries, but allow suid-(nonroot) and sgid-(nonwheel) > > binaries. Probably any ISP who runs shell accounts would love an > > option like that. > > For what reason? The users normally don't have a need to create > setuid programs, so why can't you mount /home nosuid? OTOH, system > partitions (like /usr) are required to allow suid root binaries > anyway. > > Btw., suidperl should honor the nosuid flag. > Well, thinking about it, thats right - thinking about the "bin" group owning most binaries, if you can't get a root suid shell, get a "bin" one *grin*. mounting /usr/home nosuid and noexec is a bloody execellent security thing IMHO. Cya. Adrian <adrian@psinet.net.au>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95q.970302222244.2034B-100000>