Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 21 Aug 2003 00:39:00 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        Dan Nelson <dnelson@allantgroup.com>
Cc:        ari <edelkind-freebsd-hackers@episec.com>
Subject:   Re: [future patch] dropping user privileges on demand
Message-ID:  <20030821073900.GA90003@rot13.obsecurity.org>
In-Reply-To: <20030821065854.GA11586@dan.emsphone.com>
References:  <20030817181315.GL55671@episec.com> <20030821065854.GA11586@dan.emsphone.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--W/nzBZO5zC0uMSeA
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

On Thu, Aug 21, 2003 at 01:58:54AM -0500, Dan Nelson wrote:

> It does something similar, but uses a C-like language to control a
> processes actions.  This lets you get extremely fine-grained control
> (allow httpd to bind to only port 80, once), but the rules run as
> "root", so they can grant as well as revoke privileges.  A useful
> modification would be to allow users to submit their own policies that
> can only disallow actions (i.e. all arguments and process variables are
> read-only, and the script can either pass the syscall through or return
> a failure code, nothing else).

Exercise for the reader: find a situation where the failure to perform
a syscall that normally succeeds, leads to privilege escalation :-)

Kris

--W/nzBZO5zC0uMSeA
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (FreeBSD)

iD8DBQE/RHcUWry0BWjoQKURAuEzAJ9o49lyrY3Vol2F96FMTalpPeXXLgCdGXqb
Dm3gcK2ZlBscCY1a9a+3jJE=
=KWP8
-----END PGP SIGNATURE-----

--W/nzBZO5zC0uMSeA--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030821073900.GA90003>