Date: Mon, 16 Nov 1998 21:27:33 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: William McVey <wam@sa.fedex.com> Cc: Warner Losh <imp@village.org>, Andre Albsmeier <andre.albsmeier@mchp.siemens.de>, freebsd-security@FreeBSD.ORG, jkh@zippy.cdrom.com (Jordan K. Hubbard), dima@best.net (Dima Ruban) Subject: Re: Would this make FreeBSD more secure? & sendmail changes in OpenBSD 2.4 Message-ID: <199811170527.VAA23429@apollo.backplane.com> References: <199811162114.PAA06569@s07.sa.fedex.com>
next in thread | previous in thread | raw e-mail | index | archive | help
:> (1)Add a 'kmem' and 'tty' dummy user to /usr/src/etc/master.passwd. :> Unfortunately, the operator uid is already using 2 (why it didn't :> use 5 I'll never know), so give the kmem user uid 5 and the tty :> user uid 4 (same as their groups except for the operator<>kmem :> flip). : :If we are adding standard ids to the password file, what do you think of :adding the following loginids and groupids for services that can run :standalone as unprivilged users (these are ones I've set up on my set of :machines, it'd be nice to "standardize" them): : smtp (uid and gid of 25) : www (uid and gid of 80) : ftp (uid and gid of 21) : tftp (uid and gid of 69) : syslog (uid and gid of 514) : (another root daemon which probably doesn't need root, I : just made the changes on one of my machines... I'll let the : list know how it works out.) I agree. Normally I'd use the same uid as the group id if a group exists, or barring that the /etc/services port (but those start to infringe on what people use for real user id's, we probably have to keep the id's < 100). :I've never like lumping different types services under "daemon" or "nobody". Neither have I. I think it's a gaping security hole especially when web servers use nobody. :I'd chose uid/gid 515, of course, you probably could have predicted that. :Not coincidentally, I start numbering users as 1025. :-) 1000 for me, but I know a lot of people that start at 100. :> Use RCAPF_SETTIME to fix xntpd :> :> Use TCAPF_LOWPORT to fix xntpd, lpd, bind, sendmail, and possibly :> others. : :I'm not convinced that sendmail and lpd require TCAPF_LOWPORT. I think :inetd and the 'wait' attribute can do what they need, but I'm all for :adding the solution as defined above. It probably would be usefull for :bind (which as a single process needs to bind to udp/53 as well as tcp/53). I don't think they need it either, as long as sendmail and lpd are started as root and setuid() themselves after binding the port I'd be happy. :[ this is also directed to a running thread titled "sendmail changes in : OpenBSD 2.4" ] : :I'm a fan of running a setuid root mail.local, executable by only :only group 'smtp'. Sendmail invoked as a wait service out of inetd :as user/group of 'smtp'. This avoids the potential misuse of the :delivery program by regular users (which are not in group 'smtp'), :allows sendmail to run unprivileged, and requires no code changes :to operate. I've used this sort of security policy for other programs.. giving the ability to execute to the group, modes 710, but I'm not fond of it for general use. :To strip the setuid root bit from the delivery agent will require :the daemon to be privileged so that it can setuid to the user who's :mail is being handled. I would say a setuid root program that no-one :but the MTA can execute is the lesser of two evils. : : -- William I considered having a sysctl range for a non-root setuid() call capability, but figured too many people would start screaming. -Matt Matthew Dillon Engineering, HiWay Technologies, Inc. & BEST Internet Communications & God knows what else. <dillon@backplane.com> (Please include original email in any response) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199811170527.VAA23429>