Date: Tue, 12 Feb 2002 08:47:59 +0000 From: Ceri <setantae@submonkey.net> To: Beth Reid <breid@cyberguard.com> Cc: freebsd-security@FreeBSD.org Subject: Re: Questions regarding the wheel group Message-ID: <20020212084759.D21643@cartman.private.techsupport.co.uk> In-Reply-To: <20020212021206.3F3AC9EFD3@okeeffe.bestweb.net>; from breid@cyberguard.com on Fri, Feb 08, 2002 at 11:57:38AM -0500 References: <20020212021206.3F3AC9EFD3@okeeffe.bestweb.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Feb 08, 2002 at 11:57:38AM -0500, Beth Reid said: > This message is in MIME format. Since your mail reader does not understand > this format, some or all of this message may not be legible. There's no need for that either ;) > I am doing research on the wheel group and security and I had a couple of > questions. > > Some thoughts: Why should the wheel group be used on any files? I would > think from a security point of view, wheel should not be the default or > primary group for root. This way if you are in the wheel group and have > root's password, you can become root. If you are in the wheel group, but do > not have root's password you should not gain any special privileges to any > files or directories. You should be like any other user. My opinion : if someone is in wheel then they're already a somewhat trusted user and the ability to tail logs and see what is happening on the system without having to su is a good thing for those users. > My initial step was to check the permissions on all of the files to see if > files with a group of "wheel" had permission bits where the group and other > bits differed. Did you also check what each of those files was for ? > 1) The only 2 devices on my system where wheel had more permission than > other were the following. I am not sure yet if there is a vulnerability > here. > crw-rw---- 2 root wheel 14, 0x20000000 Nov 30 09:09 > ./dev/rsa0.ctl > crw-rw---- 2 root wheel 14, 0x20000000 Nov 30 09:09 ./dev/sa0.ctl I can't see one : /dev/sa0.ctl Control mode device (to examine state while another program is accessing the device, e.g.). But then I trust my users in wheel. > 2) In the /proc directory there is a mem file for each process. This seems > to me like a vulnerability. The odd thing is that on one similar FreeBSD > 4.3 release system the group was kmem for all files in this directory, all > other systems had the group for root as wheel. So two questions here: 1) > why does the group differ on the two systems, and 2) why does the wheel > group have read privilege on these mem files? > > -rw-r----- 1 root wheel 0 Feb 6 12:27 ./proc/317/mem > -rw-r----- 1 root wheel 0 Feb 6 12:27 ./proc/318/mem They're processes running as root, therefore they have root's uid and gid. Processes running as a non-root user have different permissions, e.g. on my system : -rw-r----- 1 alf alf 0 Feb 12 08:43 /proc/26905/mem > 3) This seems harmless. > -r-xr-x--- 1 root wheel 12424 Apr 21 2001 ./usr/sbin/mptable Agreed. > 4) This seems like it could be a vulnerability. If someone is in wheel > that shouldn't be, he could read these files and perhaps gather some useful > information. > in /var/log > -rw-r----- 1 root wheel 5490 Feb 6 03:01 setuid.today > -rw-r----- 1 root wheel 5490 Feb 5 03:01 setuid.yesterday > -rw-r----- 1 root wheel 5464 Feb 2 03:01 dmesg.today > -rw-r----- 1 root wheel 5527 Feb 1 03:01 dmesg.yesterday > -rw-r----- 1 root wheel 136 Dec 1 03:02 mount.today Debatable - I like my wheel users to be able to read these. > 5) These directories allow wheel to poke around in them, but not someone in > the other group. It seems like I wouldn't want the crash files exposed. > The cron directory is odd because although wheel can poke around in cron, he > can't get to the tabs subfolder. The backup folder seems harmless(?). > Someone in wheel can remove files from /tmp. > > in/var > drwxrwxrwt 3 root wheel 512 Feb 6 03:01 tmp > drwxr-x--- 2 root wheel 512 Feb 6 03:01 backups > drwxr-x--- 3 root wheel 512 Nov 30 09:08 cron > drwxr-x--- 2 root wheel 512 Nov 30 09:08 crash vmcore files in /var/crash are created with a mode of 600. The kernel files in there are just copies of a kernel. Someone in wheel can only remove files from /var/tmp if they own them. My basic premise is that if someone shouldn't be in the wheel group unless they can be trusted - the actual benefits other than the ability to be able to su seems to me to be limited to the fact that a few more logfiles are readable. Someone else on this list will probably have different views though. Ceri -- "Ummm, excuse me. I think the network's down...?" "A communications disruption can only mean one thing... Invasion." --Lee Maguire, SDM To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020212084759.D21643>