From owner-freebsd-security@FreeBSD.ORG Mon Dec 5 20:42:20 2011 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id B362B106566B for ; Mon, 5 Dec 2011 20:42:20 +0000 (UTC) (envelope-from delphij@delphij.net) Received: from anubis.delphij.net (anubis.delphij.net [IPv6:2001:470:1:117::25]) by mx1.freebsd.org (Postfix) with ESMTP id 96D398FC0A for ; Mon, 5 Dec 2011 20:42:20 +0000 (UTC) Received: from delta.delphij.net (drawbridge.ixsystems.com [206.40.55.65]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by anubis.delphij.net (Postfix) with ESMTPSA id 4E7EA34AD; Mon, 5 Dec 2011 12:42:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=delphij.net; s=anubis; t=1323117740; bh=fPfglhygPpUQxwvL8RBjYoqIl1gb7O+/LxeB8poEdsQ=; h=Message-ID:Date:From:Reply-To:MIME-Version:To:CC:Subject: References:In-Reply-To:Content-Type:Content-Transfer-Encoding; b=NUv2tcC12RalTntrAe73hZHcc4sy9wngZeO2LNPEBzBiI84pWgRmeYFR0F8c50ZTg I4hR7W6szhA/vLlpSmxD7Mr0fhTjqr5E6g48j7tISaML/PJWlUk2aDHFGXxlGOUv/p GVVE/T8sQ9OV1luL2QOjIutytrP04Ux5duNbsY0U= Message-ID: <4EDD2CAB.5040706@delphij.net> Date: Mon, 05 Dec 2011 12:42:19 -0800 From: Xin Li Organization: The FreeBSD Project MIME-Version: 1.0 To: Mike Tancsa References: <4ED68B4D.4020004@sentex.net> <4ED69B7E.50505@frasunek.com> <4ED6C3C6.5030402@delphij.net> <4ED6D1CD.9080700@sentex.net> <4ED6D577.9010007@delphij.net> <4EDD1F2F.20802@sentex.net> <4EDD2027.9030807@delphij.net> <4EDD2AC5.9070505@sentex.net> In-Reply-To: <4EDD2AC5.9070505@sentex.net> X-Enigmail-Version: undefined Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Cc: "freebsd-security@freebsd.org" , d@delphij.net, Przemyslaw Frasunek Subject: Re: ftpd security issue ? X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: d@delphij.net List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Dec 2011 20:42:20 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Mike, On 12/05/11 12:34, Mike Tancsa wrote: > On 12/5/2011 2:48 PM, Xin Li wrote: >> >> Currently no (I thought you were in the cc list in my discussion >> with kib@?). My initial plan was simply rejecting .so's with >> wrong permissions but in the discussion turns out that would not >> be sufficient and we have also considered other ways to do it, >> e.g. have a wrapper where one can disable them completely. I >> have not a full solution yet as the change would touch quite a >> lot of things in the base system... > > Hi Xin, yes, I am on the cc list. I vaguely understand the > complexity of the issue enough to see its not an easy fix. In the > mean time, I was just looking for ways to protect the few boxes I > have that run proftpd. Right now running with "rootrevoke on" seems > to be the safest, but that has the side effect of killing active > connections. Oh for now you would probably need to patch proftpd and rtld-elf so that proftpd after chroot immediately tell rtld-elf that no .so's should be loaded from that point. I don't think I would be able to do anything before office hours as I'm working on something else for the company now. Cheers, - -- Xin LI https://www.delphij.net/ FreeBSD - The Power to Serve! Live free or die -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.18 (FreeBSD) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk7dLKsACgkQOfuToMruuMAaEwCdHb22DlVkmyzwEwk2c9o+D8gG zpUAn3RvnzzL3LIf6JXh7jH5WLQYY7aE =W4Ob -----END PGP SIGNATURE-----