Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 Jan 1996 02:19:51 -0800 (PST)
From:      Nathan Lawson <nlawson@statler.csc.calpoly.edu>
To:        msmith@atrad.adelaide.edu.au (Michael Smith)
Cc:        security@freebsd.org
Subject:   Re: Ownership of files/tcp_wrappers port
Message-ID:  <199601241019.CAA11895@statler.csc.calpoly.edu>
In-Reply-To: <199601240837.TAA26571@genesis.atrad.adelaide.edu.au> from "Michael Smith" at Jan 24, 96 07:07:59 pm

next in thread | previous in thread | raw e-mail | index | archive | help
> mailing list account stands accused of saying:
>> > or not.  Are there any more?  I really have not heard a convincing argument
>> > for bin ownership other than "too many files are owned by root".  Remember
> > 
> > which is a lame argument to boot.
> 
> If nothing else, it's convenient to have "someone" own "system" things.
> It's _preferable_ that this "someone" isn't a user in the common sense of
> the word.

This "someone" is not well-protected enough to own critical things like
binaries.  Until you can prove to me that a bin compromise is as hard as a root
compromise, I won't relent.  Consider NFS, hosts.equiv, and login.  None of 
those will stop a bin intrusion.  If you can log in as bin, login will let you.
If you can access a filesystem via NFS, bin access is allowed while root is
mapped to nobody.  Hosts.equiv allows _every_ user except root to access the
equivalent account.

Of course, I don't think rlogin and NFS are secure protocols.  But you should od
your best to protect what little security you do have.  Saying "oh, the 
protocols are fundamentally flawed, let's just throw security out the door" is
lazy.

> > user and group ownership should be based on function, instead of preference.
> 
> Naturally.  And if something is "just a binary", why shouldn't it be owned
> by bin?  Only things that need to be owned by root, so that being setuid
> is useful, should be so.

Because "just binaries" are run by root every day.  You wouldn't run a program
owned by me (I hope!)  Why would you let root run programs owned by someone
else?  Especially since the root account has more protection than bin.

> > bin is nice for non-threat functions in that it has no password
> > assigned, thus disabling any logins...  of course there is that one
> > fool in a million who will
> 
> And no shell either.

Nope.  It uses /bin/sh if the shell is null.  I prefer /noshell.
>From login.c:
        if (*pwd->pw_shell == '\0')
                pwd->pw_shell = _PATH_BSHELL;

-- 
Nate Lawson   \Yeah, I was dreaming through the 'howzlife', yawning, car black, 
Owner:         \when she told me 'mad and meaningless as ever...' and a song 
Cal Poly State  \came on the radio like a cemetery rhyme for a million crying 
University       \corpses in their tragedy of respectable existence.  - BR



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199601241019.CAA11895>