Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 05 May 2001 18:34:18 -0700
From:      Cy Schubert - ITSD Open Systems Group <Cy.Schubert@uumail.gov.bc.ca>
To:        "Dominic Marks" <dominic_marks@hotmail.com>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: Login Permissions 
Message-ID:  <200105060134.f461YbJ03934@cwsys.cwsent.com>
In-Reply-To: Your message of "Sat, 05 May 2001 13:57:29 -0000." <F53ngr5tTXeCOtrsbMe00002e67@hotmail.com> 

index | next in thread | previous in thread | raw e-mail

In message <F53ngr5tTXeCOtrsbMe00002e67@hotmail.com>, "Dominic Marks" 
writes:
> Login can be executed by any user connected with a local or remote shell. 
> Login could therefore be used as a forkbomb/dos attack which could be used 
> to eat resources (and possbibly ttys?).
> 
> Should login be set as chmod 700?

A better solution would be to only allow login to be executed using the 
exec builtin from the lowest level shell as Solaris does:

    No utmpx entry. You must exec "login" from the lowest level "shell".


Regards,                         Phone:  (250)387-8437
Cy Schubert                        Fax:  (250)387-5766
Team Leader, Sun/Alpha Team   Internet:  Cy.Schubert@osg.gov.bc.ca
Open Systems Group, ITSD, ISTA
Province of BC




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200105060134.f461YbJ03934>