Date: Sat, 29 Apr 1995 15:33:19 +0400 From: "Andrey A. Chernov, Black Mage" <ache@astral.msk.su> To: Bruce Evans <bde@zeta.org.au>, sa2c@and.or.jp Cc: security@FreeBSD.org, "Garrett A. Wollman" <wollman@lcs.mit.edu> Subject: Re: Call for remove setr[ug]id() and setre[ug]id() from libc Message-ID: <pM_FYel4m3@astral.msk.su> In-Reply-To: <199504290814.SAA16098@godzilla.zeta.org.au>; from Bruce Evans at Sat, 29 Apr 1995 18:14:04 %2B1000 References: <199504290814.SAA16098@godzilla.zeta.org.au>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <199504290814.SAA16098@godzilla.zeta.org.au> Bruce Evans writes: [wrong fix skipped] >This violates POSIX in more serious ways: if POSIX saved ids are implemented, >then setuid() by non-root doesn't change the ruid or the svuid and setgid() >by non-root doesn't change the rgid or the svgid. I recently commit SAVED_IDS change which conforms POSIX here. >There are other problems. setreuid(-1, euid) is different from seteuid(euid) >because the former is more careful about the svuid. I think this is too >surprising. Since seteuid() doesn't change the svuid, if POSIX saved ids >are enabled, then setuid() by non-root after seteuid() by root is a possible >security hole (the svuid hasn't been given up). Of course, the POSIX >setuid() shouldn't be mixed with the BSD seteuid(), but programs probably >do it. OTOH, changing setreuid() to be like the recently changed setreuid() >may break all the BSD4.4 programs that were less recently changed to assume >the 4.4 semantics for seteuid(). It was probably OK to change setreuid() >because it is deprecated and BSD4.4 programs shouldn't use it, while >BSD4.3 programs want the old semantics. 0) Now we have _all_ set*[gu]id() functions in the same way like SunOS (SunOS is de-facto standard, most of Unix pgms expects its way). SunOS have true POSIX SAVED_IDS setuid()/setgid() and BSD4.2-like setre*(). Moreover, now we compatible with Linux setuid()/setgid(), they have POSIX SAVED_IDS too. I think current scheme is the best way which is possible. 1) seteuid() does not change svuid according to SunOS. >From common sense it allows root to keep svuid untouched, I remember some recent Garrett words about it. 2) There is _no_ programs found which expects BSD4.4 setre*() because: (1) implementation _completely_ broken (they have internal static variable to mimic svuid which is true security hole), (2) setre*() treated as depricated in BSD4.4, so no new BSD4.4 oriented pgms expects it. 3) I don't see sec hole you point: root: seteuid(uid1) --> euid=uid1 ruid=x1 svuid=x2 become non-root: setuid(here can be only x1 or x2), so --> euid=x1 or x2 ruid=x1 svuid=x2 it is equivalent of: seteuid(x1 or x2), it is possible even in old variant. where is the hole? -- Andrey A. Chernov : And I rest so composedly, /Now, in my bed, ache@astral.msk.su : That any beholder /Might fancy me dead - FidoNet: 2:5020/230.3 : Might start at beholding me, /Thinking me dead. RELCOM Team,FreeBSD Team : E.A.Poe From "For Annie" 1849
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?pM_FYel4m3>