From owner-freebsd-hackers Wed Jun 18 00:01:48 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id AAA02592 for hackers-outgoing; Wed, 18 Jun 1997 00:01:48 -0700 (PDT) Received: from genesis.atrad.adelaide.edu.au (genesis.atrad.adelaide.edu.au [129.127.96.120]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id AAA02587 for ; Wed, 18 Jun 1997 00:01:44 -0700 (PDT) Received: (from msmith@localhost) by genesis.atrad.adelaide.edu.au (8.8.5/8.7.3) id QAA20880; Wed, 18 Jun 1997 16:31:36 +0930 (CST) From: Michael Smith Message-Id: <199706180701.QAA20880@genesis.atrad.adelaide.edu.au> Subject: Re: hackers-digest V3 #242 In-Reply-To: <199706180623.QAA03038@polya.blah.org> from Ada T Lim at "Jun 18, 97 04:23:10 pm" To: ada@not-enough.bandwidth.org (Ada T Lim) Date: Wed, 18 Jun 1997 16:31:36 +0930 (CST) Cc: hackers@FreeBSD.ORG X-Mailer: ELM [version 2.4ME+ PL28 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk Ada T Lim stands accused of saying: > > Anyhow, what would be a good way to implement 'setuid libraries'? > (The idea being that all function calls to this library have an > implicit setuid(0) first and a setuid() back afterwards. This discards any state that may be implicit in the user's current priviledge level though, so the library code would have to be paranoid about checking the credentials it was being run with. It's kinda sticky. > Ada -- ]] Mike Smith, Software Engineer msmith@gsoft.com.au [[ ]] Genesis Software genesis@gsoft.com.au [[ ]] High-speed data acquisition and (GSM mobile) 0411-222-496 [[ ]] realtime instrument control. (ph) +61-8-8267-3493 [[ ]] Unix hardware collector. "Where are your PEZ?" The Tick [[