Date: Mon, 26 Aug 1996 09:39:44 -0700 (PDT) From: "Rodney W. Grimes" <rgrimes@GndRsh.aac.dev.com> To: pst@shockwave.com (Paul Traina) Cc: CVS-committers@freefall.freebsd.org, cvs-all@freefall.freebsd.org, cvs-etc@freefall.freebsd.org, cvs-usrsbin@freefall.freebsd.org Subject: Re: cvs commit: src/etc/mtree BSD.var.dist src/usr.sbin/rwhod rwhod.c Message-ID: <199608261639.JAA18817@GndRsh.aac.dev.com> In-Reply-To: <199608261538.IAA12326@precipice.shockwave.com> from Paul Traina at "Aug 26, 96 08:38:44 am"
next in thread | previous in thread | raw e-mail | index | archive | help
> Introduce NFS and you eliminate security anyway. ^^^^^^^^^ pretty strong word, you may decrease it, but you don't eliminate it. I'm not so worried about hackers as I am about stupid things done by clients (people) on NFS clients (machines) that otherwise have reasonably restricted access to the server. > It's actually 775 daemon.daemon I believe. That I can live with. > If you have a better suggestion, I'm all ears. It's currently a compromise. Run as sgid daemon perhaps? And make the /var/rwho directory mode 575. > From: "Rodney W. Grimes" <rgrimes@GndRsh.aac.dev.com> > Subject: Re: cvs commit: src/etc/mtree BSD.var.dist src/usr.sbin/rwhod rwhod > >>.c > > pst 96/08/25 14:37:12 > > > > Modified: etc/mtree BSD.var.dist > > usr.sbin/rwhod rwhod.c > > Log: > > Fix buffer overrun, and run as nobody > > Hummm... I take it that you set /var/rwho nobody:whoever mode 755, which > now means /var/rwho is open for writting into if /var is NFS exported... > and all the datafiles will be smashable by other NFS hosts :-(. > > > -- > Rod Grimes rgrimes@gndrsh.aac.dev.com > Accurate Automation Company Reliable computers for FreeBSD > -- Rod Grimes rgrimes@gndrsh.aac.dev.com Accurate Automation Company Reliable computers for FreeBSD
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199608261639.JAA18817>