Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 19 Apr 1998 08:45:44 -0700
From:      Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca>
To:        Robert Watson <robert+freebsd@cyrus.watson.org>
Cc:        Philippe Regnauld <regnauld@deepo.prosa.dk>, freebsd-security@FreeBSD.ORG
Subject:   Re: kernel permissions 
Message-ID:  <199804191546.IAA17390@cwsys.cwsent.com>
In-Reply-To: Your message of "Sat, 18 Apr 1998 13:18:54 EDT." <Pine.BSF.3.96.980418131307.15725F-100000@trojanhorse.pr.watson.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
> One thing that might be nice to see is a file flag that allows writes/etc
> at some securelevels, but not at others.  Currently, the behavior seems to
> be that schg can be set at lower securelevels, but must be removed before
> writes can occur.  At high levels, it simply can't be removed.  A new flag
> might be desirable that allows changes at a lower securelevel, but
> prohibits them at a high one.  This could be applied to config files, for
> example, allowing reconfiguration at securelevels 0, -1, but preventing
> configuration of certain key files (/etc/fstab?) when the system is
> actually running.

This would negate the effectiveness of securelevels and the schg flag.  
The reason for only allowing updates at securelevels <= 0 is that you 
need to be in single user state to alter files that are deemed 
critical, e.g. schg flag, by the sysadmin.  If you can only update 
these files in single user state and single user state requires that 
you be next to the machine working at the console, then a hacker would 
have a more difficult time altering files deemed critical to site 
security.

If the proposed flag is tied directly to the network interfaces, e.g. 
if the flag allowing the schg flag or files with schg flags to be 
altered at a specified securelevel, then network interfaces should be 
automatically be disabled at that securelevel or lower.

In short, back doors = exploits.


Regards,                       Phone:  (250)387-8437
Cy Schubert                      Fax:  (250)387-5766
Open Systems Group          Internet:  cschuber@uumail.gov.bc.ca
ITSD                                   Cy.Schubert@gems8.gov.bc.ca
Government of BC            




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199804191546.IAA17390>