Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 16 Apr 1998 10:43:53 +0200
From:      Arne Henrik Juul <arnej@stud.math.ntnu.no>
To:        dima@best.net
Cc:        tsprad@set.spradley.tmi.net, louie@TransSys.COM, trost@cloud.rain.com, stable@FreeBSD.ORG, freebsd-security@FreeBSD.ORG
Subject:   Re: kernel permissions
Message-ID:  <199804160843.BAA17349@hub.freebsd.org>
In-Reply-To: Your message of "Wed, 15 Apr 1998 23:08:39 -0700 (PDT)"
References:  <199804160608.XAA03735@burka.rdy.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Dima Ruban wrote:
> Ted Spradley writes:
> > Normal usersdo not need *not* to have read access to the kernel.  If it 
> > ain't broke, don't fix it.
> 
> I've already gave you an example why it shouldn't be like this.

Your argument was not very compelling - you can't say that most,
or even many, FreeBSD machines have commercial drivers, much less
that the have such drivers with so draconian license agreements
that you're not even allowed to have the in-kernel object code
readable for normal users.  (For what it's worth, I've never
heard about such a license agreement, ever, for any piece of
software).

On my machines, I'm mostly logged in as myself, not as root.  I
think this is a good practice and I'll keep on doing that.  I
don't *want* to have any special privileges on my normal user,
and what's more, I *want* my students to be able to peek around
in the system as much as possible, also on the machines where
they can't be allowed to have the root password.  I *don't* want
to have to su root just to do normal things that shouldn't need
root access.  I've been inconvenienced by stupid programs being
installed without read access for normal users, many times
through the years.  (I do sysadmin work on a large number of
machines with various OS'es.)

I think that if *you* want a read-protected kernel (for reasons
that applies to a very small subset of FreeBSD users), *you*
should write a config file for mtree that actually helps
security, and apply it on *your* machine.  I mean, what's the
point of read-protecting the kernel in / without doing the same
to /var/db/kvm_kernel.db?

Logically, it's much more important to protect sendmail to be
unreadable, and modify it so it won't tell its version number to
normal users.  Or implementing the policy that no setuid programs
should be readable for users, since that allows them to inspect
the object code for buffer overruns and such.  (Assuming the
prospective hacker isn't smart enough to go look at the sources
to simplify the task :-)

So please, implement whatever policy you want on *your* machine!

  -  Arne H. Juul
     senior engineer,  Department of Mathematical Sciences,
     Norwegian University of Science and Technology.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199804160843.BAA17349>