Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 7 Jun 100 15:52:28 +0930 (CST)
From:      John Brazel <john@tellurian.com.au>
To:        Cy.Schubert@uumail.gov.bc.ca
Cc:        freebsd-security@FreeBSD.org
Subject:   Re: FreeBSDDEATH.c.txt (mmap dirty page no check bug)
Message-ID:  <200006070622.PAA25984@tellurus.tellurian.com.au>
In-Reply-To: <200006070424.e574Od303232@cwsys.cwsent.com> from "Cy Schubert - ITSD Open Systems Group" at Jun 6, 0 09:24:34 pm

next in thread | previous in thread | raw e-mail | index | archive | help
> >From a security standpoint a shared temporary filesystem coupled with 
> applications written as they are can be an invitation for compromise.  
> Suggestions ranging from no temporary filesystem at all to 
> subdirectories in /tmp for each user have been discussed on 
> FreeBSD-security and BUGTRAQ for many years.  Of course for root 
> /var/run reduces the risk.  The concept of a virtual temporary 
> filesystem for each user, e.g. /tmp as and address space addressable by 
> a single process group and only sharable by that process group or even 
> a single process, might go a long way to mitigate some of the risk.  

	What exactly ARE all the risks? At the risk of 'over-enthusiasm'
	(for want of a better phrase), would a purpose-written,
	security-oriented filesystem solve it?

	Something like /tmp, but with an embedded sticky bit (permanently
	set) and the inability to create symlinks (the symlink(2) syscall
	would return ENOSYS for that filesystem).

	The question, of course, is, would this fix enough of the problems
	to warrant all the effort? At the very least, backward compatibility
	wouldn't be affected.

J.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006070622.PAA25984>