Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Feb 1996 14:41:27 +1030 (CST)
From:      newton@communica.com.au (Mark Newton)
To:        bmc@telebase.com (Brian Clapper)
Cc:        nlawson@kdat.csc.calpoly.edu, msmith@comtch.iea.com, security@FreeBSD.ORG
Subject:   Re: Suspicious symlinks in /tmp
Message-ID:  <9602270411.AA25647@communica.com.au>
In-Reply-To: <199602262337.SAA00872@telebase.com.> from "Brian Clapper" at Feb 26, 96 06:37:15 pm

next in thread | previous in thread | raw e-mail | index | archive | help
Brian Clapper wrote:

 > -rw-r--r--   1 root     wheel        1176 Feb 16 09:59 /etc/passwd
 > lrwxr-xr-x   1 bmc      wheel          11 Feb 26 18:31 passwd -> /etc/passwd
 > 
 > As it turns out, the symlink ends up being owned by whoever owns its parent
 > directory--regardless of the UID of the process that created the symlink
 > and regardless of the UID that owns the file to which it points.
     [ ... ]
 > Also highly counterintuitive behavior, at least to me.

... also totally irrelevent:  The permissions on the symlink don't
arbitrate file access permissions -- The permissions on the file it's
pointing to (ie: the destination) are used for that purpose.

So:  Not only does it not matter who owns the symlink, it also doesn't
matter how it is chmod'ed.  You can set its permissions to rwxrwxrwx 
without making a spot of difference to the accessibility of the file
it's pointing at.

   - mark

---
Mark Newton                               Email: newton@communica.com.au
Systems Engineer                          Phone: +61-8-373-2523
Communica Systems                         WWW:   http://www.communica.com.au



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9602270411.AA25647>