Date: Tue, 27 Feb 1996 14:41:27 +1030 (CST) From: newton@communica.com.au (Mark Newton) To: bmc@telebase.com (Brian Clapper) Cc: nlawson@kdat.csc.calpoly.edu, msmith@comtch.iea.com, security@FreeBSD.ORG Subject: Re: Suspicious symlinks in /tmp Message-ID: <9602270411.AA25647@communica.com.au> In-Reply-To: <199602262337.SAA00872@telebase.com.> from "Brian Clapper" at Feb 26, 96 06:37:15 pm
next in thread | previous in thread | raw e-mail | index | archive | help
Brian Clapper wrote: > -rw-r--r-- 1 root wheel 1176 Feb 16 09:59 /etc/passwd > lrwxr-xr-x 1 bmc wheel 11 Feb 26 18:31 passwd -> /etc/passwd > > As it turns out, the symlink ends up being owned by whoever owns its parent > directory--regardless of the UID of the process that created the symlink > and regardless of the UID that owns the file to which it points. [ ... ] > Also highly counterintuitive behavior, at least to me. ... also totally irrelevent: The permissions on the symlink don't arbitrate file access permissions -- The permissions on the file it's pointing to (ie: the destination) are used for that purpose. So: Not only does it not matter who owns the symlink, it also doesn't matter how it is chmod'ed. You can set its permissions to rwxrwxrwx without making a spot of difference to the accessibility of the file it's pointing at. - mark --- Mark Newton Email: newton@communica.com.au Systems Engineer Phone: +61-8-373-2523 Communica Systems WWW: http://www.communica.com.au
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9602270411.AA25647>