Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 29 Nov 1999 15:44:41 -0800 (PST)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        Warner Losh <imp@village.org>
Cc:        Kris Kennaway <kris@hub.freebsd.org>, Dan Moschuk <dan@FreeBSD.ORG>, cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG
Subject:   Re: cvs commit: src/sys/i386/conf files.i386 src/sys/kern kern_fork.c src/sys/libkern arc4random.c src/sys/sys libkern.h 
Message-ID:  <199911292344.PAA12574@apollo.backplane.com>
References:  <199911292239.OAA11977@apollo.backplane.com>  <Pine.BSF.4.21.9911291431310.19254-100000@hub.freebsd.org>  <199911292335.QAA97810@harmony.village.org>

next in thread | previous in thread | raw e-mail | index | archive | help
:I don't think this is true.  There are tmp file races with things like
:gcc which would allow one to insert arbitrary code into a file being
:compile, should one wish to do so and can guess things.  At least
:there used to be, I don't know if this is the case still.  When you
:are racing others on the system w/o this change you had a small range
:of pids to choose from.  After this change there is a large range.
:some of the races are to overwrite an arbitrary file on the system,
:while others are to provide bad data to a process running under a
:different uid to do bad things to that uid...
:
:Warner

    Do you want another example?  Fine, then how about this:  /proc is 
    publically readable.  You can obtain a list of pid's from that,
    figure out which one is new, and still win the race.

    You see?  Randomizing pid's is *very* weak security.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199911292344.PAA12574>