tech-userlevel archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: setuid scripts
christos%astron.com@localhost (Christos Zoulas) writes:
> In article <87r62158mq.fsf%inbox.ru@localhost>, Aleksej Saushev
> <asau%inbox.ru@localhost> wrote:
>>Alan Barrett <apb%cequrux.com@localhost> writes:
>>
>>> On Sat, 14 Feb 2009, Aleksej Saushev wrote:
>>>> > I think you can run setuid scripts if you build a custom kernel with
>>>> > SETUIDSCRIPTS enabled.
>>>>
>>>> Does it prevent symlink attack or simply disables the check?
>>>
>>> AFAIK it works properly, by passing the script to the shell using an
>>> open file descriptor, named via /dev/fd/${number}. I have no idea why
>>> it's disabled by default.
>>
>>Any reason to keep it disabled?
>
> People who write setuid shell scripts usually don't know what they are doing?
What I see in practice, is that they simply work around the check by
implementing setuid binary wrapper instead of learning how to write
correct scripts (those are _not_ shell ones in many cases).
--
CKOPO BECHA...
CKOPO CE3OH...
Home |
Main Index |
Thread Index |
Old Index