Date: Sat, 02 Nov 1996 10:33:07 -0800 From: Cy Schubert <cy@cwsys.cwent.com> To: Warner Losh <imp@village.org> Cc: Marc Slemko <marcs@znep.com>, security@freebsd.org Subject: Re: Vadim Kolontsov: BoS: Linux & BSD's lpr exploit Message-ID: <199611021833.KAA00905@cwsys.cwent.com> In-Reply-To: Your message of "Fri, 25 Oct 1996 18:16:59 MDT." <E0vGwQt-0002j6-00@rover.village.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> In message <Pine.BSF.3.95.961025174911.27697E-100000@alive.ampr.ab.ca> > Marc Slemko writes: > : I would also suggest that perhaps it is even worth scrapping lpr entirely. > : There are numerous other security changes in the OpenBSD source tree, and > : even then I would bet there are still other problems with the code. > > Yes. There are a boatload. And a bunch more just went in today. > Many of them are very defensive programming, and seem to be somewhat > sane. I'm not sure how many of them should have some kind of warning > generated when they are triggered. It all depends on how paranoid you > are :-). I don't have a good answer for that. At the very least > OpenBSD will be much less likely to be breached, which is likely the > most important thing. Sorry for the lateness of this reply. I've been spending the morning catching up on the various mailing lists I subscribe to. How about an LPRng port? Then it would be up to each individual sysadmin whether to use a possibly more secure non-BSD print subsystem or the existing insecure print subsystem. The port could disable the BSD LPR/LPD by filing off the s and x bits. If the the sysadmin opts to pkg_delete the LPRng package, the BSD print subsystem would be re-enabled. Regards, Phone: (604)389-3827 Cy Schubert OV/VM: BCSC02(CSCHUBER) Open Systems Support BITNET: CSCHUBER@BCSC02.BITNET ITSD Internet: cschuber@uumail.gov.bc.ca cschuber@bcsc02.gov.bc.ca "Quit spooling around, JES do it."
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199611021833.KAA00905>