Date: Fri, 11 Oct 1996 11:58:46 +0200 (MET DST) From: sos@FreeBSD.org To: ache@nagual.ru (=?KOI8-R?Q?=E1=CE=C4=D2=C5=CA_=FE=C5=D2=CE=CF=D7?=) Cc: joerg_wunsch@uriah.heep.sax.de, sos@freefall.freebsd.org, CVS-committers@freefall.freebsd.org, cvs-all@freefall.freebsd.org, cvs-usrsbin@freefall.freebsd.org Subject: Re: cvs commit: src/usr.sbin/ppp command.c Message-ID: <199610110958.LAA15010@ra.dkuug.dk> In-Reply-To: <199610110917.NAA00448@nagual.ru> from "=?KOI8-R?Q?=E1=CE=C4=D2=C5=CA_=FE=C5=D2=CE=CF=D7?=" at Oct 11, 96 01:17:44 pm
next in thread | previous in thread | raw e-mail | index | archive | help
In reply to =?KOI8-R?Q?=E1=CE=C4=D2=C5=CA_=FE=C5=D2=CE=CF=D7?= who wrote: > > > As Soren Schmidt wrote: > > > sos 96/10/10 04:27:38 > > > > > > Modified: usr.sbin/ppp command.c > > > Log: > > > Allow shell commands in all modes. > > > > Do you get a root shell now if you run ``ppp -auto'', connect to port > > 3000, and issue a `shell'? I would consider this a very bad move! > > > > Yes, we just make security hole, it should be fixed. Oops... I guess it was too late in the night when I did that... Any good suggestions as how to make this work securely ?? Maybe only allowing the program named in the ppp.xxx file, that way security is at the/etc/ppp level. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Soren Schmidt (sos@FreeBSD.org) FreeBSD Core Team So much code to hack -- so little time.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199610110958.LAA15010>