Date: Wed, 10 Oct 2001 14:43:04 -0700 (PDT) From: Matt Dillon <dillon@earth.backplane.com> To: Dag-Erling Smorgrav <des@ofug.org> Cc: Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, cvs-committers@FreeBSD.ORG, cvs-all@FreeBSD.ORG Subject: Re: cvs commit: src/sys/kern kern_proc.c kern_prot.c uipc_socket.c uipc_usrreq.c src/sys/netinet raw_ip.c tcp_subr.c udp_usrreq.c Message-ID: <200110102143.f9ALh4E22413@earth.backplane.com> References: <200110092140.f99LeVA74145@freefall.freebsd.org> <xzp7ku3h6c8.fsf@flood.ping.uio.no> <200110101522.f9AFM0S63283@khavrinen.lcs.mit.edu> <xzpy9mjfq4z.fsf@flood.ping.uio.no>
next in thread | previous in thread | raw e-mail | index | archive | help
:Garrett Wollman <wollman@khavrinen.lcs.mit.edu> writes: :> <<On 10 Oct 2001 17:17:59 +0200, Dag-Erling Smorgrav <des@ofug.org> said: :> > > "Unprivileged processes may see subjects/objects with different real uid" :> > Would people mind a lot if this variable defaulted to 0? :> Hell yes. : :That's not a constructive response. : :To me, the ability of unprivileged users to obtain information about :other users' processes and sockets is : : a) unnecessary : b) a violation of privacy : c) a security risk : :Unless you can provide an argument showing that this is necessary to :the correct operation of a FreeBSD system, I'll simply ignore your :contribution to this discussion. : :DES :-- :Dag-Erling Smorgrav - des@ofug.org The number of times I or some other user on a multi-user system has had to track down a resource hog and notify the sysops is uncountable. Specifically, at BEST, our users helped us a great deal in regards to policing the shell machines precisely because they could monitor other user's processes through 'ps' and friends. A lot of blame that would have otherwise fallen on us instead fell on the people responsible for causing the problem, which is good. I would argue that there are several levels of visibility here that could be governed by sysctl's. For example, if we take 'fstat' and 'ps' I would say that a user in the wheel group should have full access to both, while a user outside of wheel perhaps should only have access to 'ps'. That's just an example. Either way, it's obvious to me that the correct solution is to create sysctl variables to govern access levels for root, wheel, and non-wheel users. In -stable it should absolutely default to full access, simply because nobody has shown any pressing security issues that would require us to pull full access. In -current it could be argued that other defaults are reasonable. There was one security issue with 'ps' in the past, and that was the 'e' option. If you take a look at 'ps' now you will note that, in fact, we do not display the environment for processes not owned by the user doing the ps. I know of no other security issues, not even with fstat. -Matt To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200110102143.f9ALh4E22413>