Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Feb 1997 16:25:30 -0700 (MST)
From:      Ade Barkah <mbarkah@hemi.com>
To:        angio@aros.net (Dave Andersen)
Cc:        abelits@phobos.illtel.denver.co.us, hackers@freebsd.org
Subject:   Re: disallow setuid root shells?
Message-ID:  <199702242325.QAA12075@hemi.com>
In-Reply-To: <199702241823.LAA27302@fluffy.aros.net> from Dave Andersen at "Feb 24, 97 11:23:51 am"

next in thread | previous in thread | raw e-mail | index | archive | help
Dave wrote:

> >   IMHO adding "anti-setuid" code into shell will help, but that 
> > help won't worth the effort of typing "setuid(getuid());" ...
> 
>    I disagree.  It's a small thing, and very easy to get around, but
> it would help reduce the number of breakins by people who don't 
> understand what they're doing aside from running this program-thingy
> that someone gave them. ...

The anti-setuid code will not reduce breakins... by the time
they're doing 'chmod u+s sh', they _already_have_ root access.

What I'd do is to booby-trap the shells, so if it runs setuid,
it _seems_ to run but reaaaalllyyyyy slooooowwww, and notifies
me in the meantime. =-)

Regards,

-Ade
-------------------------------------------------------------------
Inet: mbarkah@hemi.com - HEMISPHERE ONLINE - <http://www.hemi.com/>;
-------------------------------------------------------------------



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199702242325.QAA12075>