Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jul 2000 15:44:04 -0400 (EDT)
From:      Brian Fundakowski Feldman <green@FreeBSD.org>
To:        Robert Watson <rwatson@FreeBSD.org>
Cc:        Marcel Moolenaar <marcel@cup.hp.com>, cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org, security-officer@FreeBSD.org
Subject:   Re: cvs commit: src/sys/i386/linux linux_dummy.c linux_misc.c
Message-ID:  <Pine.BSF.4.21.0007201534100.1758-100000@green.dyndns.org>
In-Reply-To: <Pine.NEB.3.96L.1000720125351.85018B-100000@fledge.watson.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 20 Jul 2000, Robert Watson wrote:

> (3) For that behavior is not the same, how can we provide that information
> to the application, or prevent a problem.  This is an important case,
> because this is where the sendmail bug occurred on Linux.  In Linux, the
> setuid() call is now permitted to fail even if the effective uid is zero.
> In a few months, the same will be true of FreeBSD.  However, the sendmail
> application assumed that setuid() would always succeed, and so didn't
> check the error return.  Do linux applications check the return for, say,
> setfsuid()?  Right now, is our behavior to kill the application?  That's
> certainly fail-safe, although not fail-happy.

I could only say that I don't think that allowing privilege-dropping
setuid() calls to fail isn't one of the worst ideas ever iff in /every/
case that setuid() et al fail to drop privileges, the application got
a uprintf(9) to show this, log(9) was called to record it, and the
system call performed a psignal(p, SIGKILL).  There is absolutely no
reason that traditional applications should be _able_ to be made more
INsecure via capabilities.  If a standard says we should not allow an
application to drop privileges, we should either
	a) Don't follow that standard.
	b) Allow it to fail securely: kill the process immediately.

Needless to say, it should act exactly the same for the equivalent
Linux calls.  We have an obligation to security much more than we
have an obligation to act exactly like Linux, even in the Linux
binary activator.

>   Robert N M Watson 
> 
> robert@fledge.watson.org              http://www.watson.org/~robert/
> PGP key fingerprint: AF B5 5F FF A6 4A 79 37  ED 5F 55 E9 58 04 6A B1
> TIS Labs at Network Associates, Safeport Network Services

--
 Brian Fundakowski Feldman           \  FreeBSD: The Power to Serve!  /
 green@FreeBSD.org                    `------------------------------'



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007201534100.1758-100000>