Date: Fri, 18 Dec 1998 19:57:07 +0100 (CET) From: "Marco Molteni" <molter@tin.it> To: "Jordan K. Hubbard" <jkh@zippy.cdrom.com> Cc: freebsd-security@FreeBSD.ORG Subject: Re: A better explanation (was: buffer overflows and chroot) Message-ID: <Pine.BSF.3.96.981218193124.339A-100000@nympha> In-Reply-To: <62537.913989002@zippy.cdrom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 18 Dec 1998, Jordan K. Hubbard wrote: > > In my situation I have a *legitimate* user, call him Bob, who actively > > searches such buffer overflows. He does it for research, and he isn't > > unserious as you state, I assure you. > > If he's searching for truely interesting exploits and he needs root > priviledge for this, then he must not be very serious about this. :-) Jordan, obviously I agree with you, but I described something different. Scenario: 1. Bob is a non privileged user. 2. Bob actively searches for buffer overflows in suid binaries. 3. if Bob is able to do his job, soon or later he'll get root. 4. I don't mind if Bob is a good guy or a bad guy, I don't want anybody to be root on my machines. 5. I want to put him in a chroot jail full of suid binaries, but suid not to root, to pseudoroot, where pseudoroot is a non privileged user. 6. Bob can do all his experiments in his nice jail. 6. if Bob becomes pseudoroot, I am still safe, since: 6.1 he is in a chroot jail 6.2 in the jail there isn't any executable suid to a privileged user (root, bin, whatever). 6.3 from 6.2, he can't escape from the jail is 6.3 correct? > If someone wants to be root on a box, make him get his own to destroy. I perfectly agree. Marco To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.981218193124.339A-100000>