Date: Wed, 24 May 2000 19:11:22 -0700 (PDT) From: Matthew Dillon <dillon@apollo.backplane.com> To: Nick Sayer <nsayer@sftw.com> Cc: "Jeroen C. van Gelderen" <jeroen@vangelderen.org>, freebsd-hackers@FreeBSD.ORG Subject: Re: Needed: suid library calls (was Re: cvs commit: src/crypto/openssh sshd_config) Message-ID: <200005250211.TAA78261@apollo.backplane.com> References: <sheldonh@uunet.co.za> <20000524090528.ECF641CE1@overcee.netplex.com.au> <20000524022840.C79861@freebsd.org> <200005241446.KAA60257@khavrinen.lcs.mit.edu> <20000524075921.A53829@freebsd.org> <200005241709.NAA60822@khavrinen.lcs.mit.edu> <20000524105558.A3407@freebsd.org> <200005241853.OAA61188@khavrinen.lcs.mit.edu> <392C3E40.E0D8974D@vangelderen.org> <392C60F1.91EDC30D@sftw.com>
next in thread | previous in thread | raw e-mail | index | archive | help
:"Jeroen C. van Gelderen" wrote: : :> [...] :> :> Since user authentication is needed by more than one program it :> should live in it's own process. Right now there is code :> duplication and it is impossible to change the authentication :> policy without messing with sshd. :> : :What we _really_ need is some mechanism to recognize the difference :between a user program and a system library, with an eye towards :granting privileges to trusted libraries without letting those privileges :leak past the library in question. Oh god, its MULTICS! Run! Run! Run for the hills! -Matt To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200005250211.TAA78261>