Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 10 Feb 1996 10:33:24 -0800 (PST)
From:      "az.com" <yankee@anna.az.com>
To:        freebsd-security@FreeBSD.org
Subject:   Want OS patch to restrict root processes to local
Message-ID:  <Pine.BSF.3.91.960210094921.26616E-100000@anna.az.com>
In-Reply-To: <Pine.LNX.3.91.960210110352.492B-100000@n2wx.ampr.org>

index | next in thread | previous in thread | raw e-mail


Where would I go in the source code or has someone already created the
following: 

For all network and dialin parented processes, i.e., hackers coming from 
internet or dial-in using a legitimate user's password to get a shell:

Prevents any process which gained root access via hacking from getting 
real root priveledge even though it appears they attained it. (kernel 
does nothing) this would prevent setuid or even if someone actually used 
the root passwd via su

I have no need, except in special circustances (hence the toggle switch),
to allow any process originating from a dialin or network port to ever
execute as root. 

To make the whole thing fly would require the inclusion of a short
registry file containing /pathname/programname(s) exempt from this
restriction. This would allow common users to execute setuid programs like 
/usr/bin/passwd.

Otherwise, the kernel would not return an error to the user, but never 
actually execute as root. It would also immedately generate a log.

This would completely automate the detection of new holes the first time 
they are ever tried.

Instead of only searching for and analyzing for security holes - let the
holes exist, and when they are found autodiscover them and plug them at
the moment of intrusion. 


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960210094921.26616E-100000>