Subject: Re: [secure@FREEBSD.LUBLIN.PL: FreeBSD (and other BSDs?) local root explot]
To: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
From: Manuel Bouyer <bouyer@antioche.lip6.fr>
List: tech-security
Date: 08/27/1999 17:02:01
by redmail.netbsd.org with SMTP; 27 Aug 1999 15:02:04 -0000
by antioche.lip6.fr (8.9.3/8.9.3) with ESMTP id RAA06612;
Fri, 27 Aug 1999 17:02:02 +0200 (MEST)
Date: Fri, 27 Aug 1999 17:02:01 +0200
From: Manuel Bouyer <bouyer@antioche.lip6.fr>
To: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
Cc: "Todd C. Miller" <Todd.Miller@courtesan.com>, tech-security@netbsd.org
Subject: Re: [secure@FREEBSD.LUBLIN.PL: FreeBSD (and other BSDs?) local root explot]
Message-ID: <19990827170201.A4793@antioche.lip6.fr>
References: <Todd.Miller@courtesan.com> <199908271457.OAA19930@orchard.arlington.ma.us>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <199908271457.OAA19930@orchard.arlington.ma.us>; from Bill Sommerfeld on Fri, Aug 27, 1999 at 10:57:54AM -0400
On Fri, Aug 27, 1999 at 10:57:54AM -0400, Bill Sommerfeld wrote:
> I think coredumps through symlinks are dangerous in general and should
> just be disabled.
I'd prefer we'd go this way too.
>
> IMHO what the folks creating symlinks to not send their coredumps into
> NFS "really" want is a per-process inherited attribute which i'll call
> the "core filename format".
>
> Currently it's "%n.core"
>
> reasonable things might be:
>
> format chars:
> n: program name
> p: process id
> u: user login name (as set by setlogin(2)), ...
>
> Implementing this seems like a reasonable afternoon project and
> doesn't seem fraught with risk like the "check owner of symlink" thing
> would be..
More work than I want to put into this, but sounds nice :)
--
Manuel Bouyer, LIP6, Universite Paris VI. Manuel.Bouyer@lip6.fr
--