Date: Fri, 9 Feb 2001 17:49:49 -0500 (EST) From: Robert Watson <rwatson@freebsd.org> To: 207.100@tj2.demon.co.uk Cc: freebsd-hackers@freebsd.org Subject: Re: /etc/security: add md5 to suid change notification? Message-ID: <Pine.NEB.3.96L.1010209174800.42231D-100000@fledge.watson.org> In-Reply-To: <3A84689F.6625@tj2.demon.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 9 Feb 2001 207.100@tj2.demon.co.uk wrote: > > the use of elevated security levels (which are necessary if > > those flags are to have any force) has side effects that make > > them useless on lots of systems (e.g., inability to run X). > > Inability to run X ? > > I'm running at level=3, and X is quite happy. *Starting* X is not > possible (AFAIK) at level=3. Good thing it's fairly stable :-) If X has open file descriptors for privileged devices for the purposes of direct memory access, the debugging interfaces (and possibly exploits in shared libraries) can be used to control the X server in such a way that securelevels can be disabled or circumvented. This is because the securelevel checks associated with devices are generally performed on the open() event; the same effect that allows X to keep working after the securelevel is raised allows an attacker to circumvent the protections. Robert N M Watson FreeBSD Core Team, TrustedBSD Project robert@fledge.watson.org NAI Labs, Safeport Network Services To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1010209174800.42231D-100000>
