Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 9 Feb 2001 17:49:49 -0500 (EST)
From:      Robert Watson <rwatson@freebsd.org>
To:        207.100@tj2.demon.co.uk
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: /etc/security: add md5 to suid change notification?
Message-ID:  <Pine.NEB.3.96L.1010209174800.42231D-100000@fledge.watson.org>
In-Reply-To: <3A84689F.6625@tj2.demon.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help

On Fri, 9 Feb 2001 207.100@tj2.demon.co.uk wrote:

> > the use of elevated security levels (which are necessary if
> > those flags are to have any force) has side effects that make
> > them useless on lots of systems (e.g., inability to run X).
> 
> Inability to run X ?
> 
> I'm running at level=3, and X is quite happy. *Starting* X is not
> possible (AFAIK) at level=3.  Good thing it's fairly stable :-)

If X has open file descriptors for privileged devices for the purposes of
direct memory access, the debugging interfaces (and possibly exploits in
shared libraries) can be used to control the X server in such a way that
securelevels can be disabled or circumvented.  This is because the
securelevel checks associated with devices are generally performed on the
open() event; the same effect that allows X to keep working after the
securelevel is raised allows an attacker to circumvent the protections.

Robert N M Watson             FreeBSD Core Team, TrustedBSD Project
robert@fledge.watson.org      NAI Labs, Safeport Network Services




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.NEB.3.96L.1010209174800.42231D-100000>