Date: Wed, 26 Nov 2003 11:36:08 -0500 (EST) From: Matt Piechota <piechota@argolis.org> To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@freebsd.org Subject: Re: perms of /dev/uhid0 Message-ID: <20031126113319.Q16087@cithaeron.argolis.org> In-Reply-To: <6.0.1.1.0.20031126104757.034e1988@209.112.4.2> References: <6.0.1.1.0.20031126101602.06e8e9f0@209.112.4.2> <6.0.1.1.0.20031126104757.034e1988@209.112.4.2>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 26 Nov 2003, Mike Tancsa wrote: > I know for our setup, there is nothing else that would need to talk to this > device so I could do something like that. Not sure of the implications if > someone unplugged the UPS and put their own device into the port. The > physical server is in a locked box, but the UPS is not. So if they somehow > managed to blow up the daemon by overflowing a buffer, it would be nice > that its a non root user. However, I do not try and read more than > sizeof(buffer) so I dont see any obvious ways... Looking at /etc/usbd.conf, it appears that you can specify what USB Manuf and Device ID the UPS is, so it'd only chgrp stuff when the device was the UPS. I suppose that wouldn't stop someone who changed their device IDs to match the UPS, but that seems like a minimal risk. -- Matt Piechota
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20031126113319.Q16087>