From owner-freebsd-stable Wed Apr 15 21:27:28 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id VAA28524 for freebsd-stable-outgoing; Wed, 15 Apr 1998 21:27:28 -0700 (PDT) (envelope-from owner-freebsd-stable@FreeBSD.ORG) Received: from whizzo.TransSys.COM (whizzo.TransSys.COM [144.202.42.10]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id VAA28327; Wed, 15 Apr 1998 21:27:09 -0700 (PDT) (envelope-from louie@whizzo.TransSys.COM) Received: from whizzo.TransSys.COM (localhost.transsys.com [127.0.0.1]) by whizzo.TransSys.COM (8.8.8/8.7.3) with ESMTP id AAA06207; Thu, 16 Apr 1998 00:26:56 -0400 (EDT) Message-Id: <199804160426.AAA06207@whizzo.TransSys.COM> X-Mailer: exmh version 2.0.1 12/23/97 To: dima@best.net cc: tsprad@set.spradley.tmi.net, trost@cloud.rain.com, stable@FreeBSD.ORG, freebsd-security@FreeBSD.ORG From: "Louis A. Mamakos" Subject: Re: kernel permissions References: <199804160356.UAA03077@burka.rdy.com> In-reply-to: Your message of "Wed, 15 Apr 1998 20:56:35 PDT." <199804160356.UAA03077@burka.rdy.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Thu, 16 Apr 1998 00:26:55 -0400 Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk > Louis A. Mamakos writes: > > > > > One more time. In some cases you don't want your users to read kernel > > > namelist. Generic kernel source code won't help. > > > > So, chmod 440 /kernel on *your* system. > > > > And how many cases are there where other programs installed on the system > > need to read the kernel namelist? You'll break those by making a change > > in the distribution. > > Every program that needs to have an access to the kernel namelist needs to > be sgid to kmem (if it's not already sgid to root). Otherwise it won't be > able to do _anything_ with this information. > > Which means - this change is not going to break anything. By this reasoning, there's no point in removing read permission either. Perhaps I'm looking at the symbols debugging a problem? Or because I'm curious how the kernel was configured, so I do a strings /kernel | egrep '^__' to get the file fed to config(8) and embedded in the file? > > > Another example. Do search on your local box for all the programs, that > > > don't allow 'others' to read the binary. Ever wonder why? > > > > Hmm.. I found exactly 1 - suidperl. This is hardly a compelling argument > > to change a well established convention. > > What about suidperl? Yeah, what about it? A more likely example would have been a program with some password embedded within it. We don't see to have any of those. > > I don't dispute the utility to some for changing the permissions on the > > /kernel file, but it's just not clear this is a universally good idea. > > Next thing you know, you'll want to chmod 440 /etc/rc.conf :-) > > Changing permissions on rc.conf won't do _any_ good. And removing read permission from the kernel does? This all seems like FUD. You seem to have unspecified reasons why you don't want your users to look at the symbols on your kernel. I suggest you remove read permission on your machine. It seems that the potential downside of removing read permission is greater than the unspecified gain of doing so. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message