Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 May 1996 10:31:06 -0700 (PDT)
From:      Jim Dennis <jimd@mistery.mcafee.com>
To:        jrclark@felix.iupui.edu (John Clark)
Cc:        questions@freebsd.org
Subject:   Re: kernel file permissions
Message-ID:  <199605281731.KAA18866@mistery.mcafee.com>
In-Reply-To: <2.2.32.19960528110438.0030d694@felix.iupui.edu> from "John Clark" at May 28, 96 10:59:46 am

next in thread | previous in thread | raw e-mail | index | archive | help
> 
> Hello,
>  
> I was looking at the default kernel permissions...  Is there any need to
> have them so open?  Why should there be read and execute permissions for the
> "other" group?  I suppose, you could reverse that question on me: "why not
> let everyone read and execute it?"
> 
> Anyway, it seems to work great like this:
> 
> -r--------   1 root  wheel   705521 May 21 12:33 kernel
> -r--------   1 root  wheel  1139171 May 18 12:15 kernel.gen
> 
> Call me anal, but this seems much more desirable.  If someone knows of a
> reason why the above permissions may be bad (ie. different run levels?),
> please let me know -- but it works just fine as far as I can tell.

	Some debuggers and/or some diagnostics might need to read
	the kernel to look for some data structures.  Linux has a 
	/System.map for some reason.

	However I run my Linux and FreeBSD systems with read-only
	kernels.  I see no security benefit to non-readable kernel
	(particularly as the src tree usually must be at least 
	"group" readable).

	I also add 'chflags syschg' to that -- so it's harder for
	me to damage a kernel file (or any of my libs, or bins)
	even when I'm su'd to 'root'

Jim Dennis,
System Administrator,
McAfee Associates
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199605281731.KAA18866>