Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Oct 2001 14:43:04 -0700 (PDT)
From:      Matt Dillon <dillon@earth.backplane.com>
To:        Dag-Erling Smorgrav <des@ofug.org>
Cc:        Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG
Subject:   Re: cvs commit: src/sys/kern kern_proc.c kern_prot.c uipc_socket.c uipc_usrreq.c src/sys/netinet raw_ip.c tcp_subr.c udp_usrreq.c
Message-ID:  <200110102143.f9ALh4E22413@earth.backplane.com>
References:  <200110092140.f99LeVA74145@freefall.freebsd.org> <xzp7ku3h6c8.fsf@flood.ping.uio.no> <200110101522.f9AFM0S63283@khavrinen.lcs.mit.edu> <xzpy9mjfq4z.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help
:Garrett Wollman <wollman@khavrinen.lcs.mit.edu> writes:
:> <<On 10 Oct 2001 17:17:59 +0200, Dag-Erling Smorgrav <des@ofug.org> said:
:> > > "Unprivileged processes may see subjects/objects with different real uid"
:> > Would people mind a lot if this variable defaulted to 0?
:> Hell yes.
:
:That's not a constructive response.
:
:To me, the ability of unprivileged users to obtain information about
:other users' processes and sockets is
:
: a) unnecessary
: b) a violation of privacy
: c) a security risk
:
:Unless you can provide an argument showing that this is necessary to
:the correct operation of a FreeBSD system, I'll simply ignore your
:contribution to this discussion.
:
:DES
:-- 
:Dag-Erling Smorgrav - des@ofug.org

    The number of times I or some other user on a multi-user system has
    had to track down a resource hog and notify the sysops is uncountable.
    Specifically, at BEST, our users helped us a great deal in regards to
    policing the shell machines precisely because they could monitor other
    user's processes through 'ps' and friends.  A lot of blame that would
    have otherwise fallen on us instead fell on the people responsible for
    causing the problem, which is good.

    I would argue that there are several levels of visibility here that
    could be governed by sysctl's.  For example, if we take 'fstat' and 'ps'
    I would say that a user in the wheel group should have full access to
    both, while a user outside of wheel perhaps should only have access to
    'ps'.  That's just an example.

    Either way, it's obvious to me that the correct solution is to create
    sysctl variables to govern access levels for root, wheel, and non-wheel
    users.  In -stable it should absolutely default to full access, simply
    because nobody has shown any pressing security issues that would require
    us to pull full access.  In -current it could be argued that other
    defaults are reasonable.

    There was one security issue with 'ps' in the past, and that was the 'e'
    option.  If you take a look at 'ps' now you will note that, in fact,
    we do not display the environment for processes not owned by the user
    doing the ps.  I know of no other security issues, not even with fstat.

						-Matt



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200110102143.f9ALh4E22413>