Date: Mon, 15 Jul 1996 11:00:23 -0400 (EDT) From: Paul Danckaert <pauld@umbc.edu> To: Mike Newell <mnewell@kaizen.net> Cc: jbhunt <jbhunt@mercury.gaianet.net>, freebsd-security@freebsd.org, root@mercury.gaianet.net Subject: Re: New EXPLOIT located! Message-ID: <Pine.SGI.3.91.960715104720.7723A-100000@umbc7.umbc.edu> In-Reply-To: <Pine.SGI.3.92.960715103831.1447A-100000@dada.kaizen.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 15 Jul 1996, Mike Newell wrote: > On Mon, 15 Jul 1996, Paul Danckaert wrote: > > > The normal policy we use when setting up machines here is to do a find > > for suid and sgid files on the system. Pick off the essential ones, and > > strip the bits off any others. Its saved us from several irix and sun > > holes in the past.. and one or two bsd ones now too. > > What do you consider "essential ones"? I realize that a case-by-case > analysis of the pros/cons of what to/not keep SUID would be a book in > itself [:-)], especially since the usefulness of each is dependent on what > the system is being used for. However it would be nice to know what > utilities *must* be SUID for a baseline system, and especially what > utilities are "safely" SUID and what aren't. Well, the case-by-case basis of it makes it sort of difficult to come up with a real list. Some things I am unsure of, since I don't know if they will adversely affect the system.. but in general PPP/slip (ppp{,d}, sliplogin) Multicast (mrinfo,mrtrace) SuidPerl (sperl*, suidperl*) Rdist (I run usc's rdist) timed (timedc.. I run xntpd anyway.) mount_* commands If its a server box, and doesn't have to be very user friendly, I take a more restrictive approach and nuke things like at{,q,rm}, lock, and things like that. Now, I'm sure that most of these are safe.. however, if they are not necessary for the system to run, and I don't use them, I don't see the point of leaving them suid root. After all, I can make them suid later if I need them.. One question I do have, on an unrelated topic, is if people have a way of setting up a box so people can't just ^C the boot, and get a root prompt? Perhaps putting a trap in the rc scripts, or something else? paul
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SGI.3.91.960715104720.7723A-100000>