Date: Wed, 7 Jun 100 15:52:28 +0930 (CST) From: John Brazel <john@tellurian.com.au> To: Cy.Schubert@uumail.gov.bc.ca Cc: freebsd-security@FreeBSD.org Subject: Re: FreeBSDDEATH.c.txt (mmap dirty page no check bug) Message-ID: <200006070622.PAA25984@tellurus.tellurian.com.au> In-Reply-To: <200006070424.e574Od303232@cwsys.cwsent.com> from "Cy Schubert - ITSD Open Systems Group" at Jun 6, 0 09:24:34 pm
next in thread | previous in thread | raw e-mail | index | archive | help
> >From a security standpoint a shared temporary filesystem coupled with > applications written as they are can be an invitation for compromise. > Suggestions ranging from no temporary filesystem at all to > subdirectories in /tmp for each user have been discussed on > FreeBSD-security and BUGTRAQ for many years. Of course for root > /var/run reduces the risk. The concept of a virtual temporary > filesystem for each user, e.g. /tmp as and address space addressable by > a single process group and only sharable by that process group or even > a single process, might go a long way to mitigate some of the risk. What exactly ARE all the risks? At the risk of 'over-enthusiasm' (for want of a better phrase), would a purpose-written, security-oriented filesystem solve it? Something like /tmp, but with an embedded sticky bit (permanently set) and the inability to create symlinks (the symlink(2) syscall would return ENOSYS for that filesystem). The question, of course, is, would this fix enough of the problems to warrant all the effort? At the very least, backward compatibility wouldn't be affected. J. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006070622.PAA25984>