On Wed, Oct 27, 1999 at 06:35:56PM -0400, Wietse Venema wrote: > ssh starts up with the unprivileged real UID of the user; therefore > setting the effective UID also to that of the user makes the process > memory accessible for unprivileged access. This is how any reasonable > UNIX system works, not just Solaris. I disagree. A reasonable system tracks whether a process has ever had elevated privileges, and deny access to process memory (core dumps, debugger attachments) if it has had. If your system doesn't have this behaviour, that should (in my opinion) be reported to the vendor as a bug. >From the code, it seems FreeBSD has had correct behaviour for this (for debugging) at least since rev 1.21 of sys/kern/sys_process.c (1996/01/24, prior to the 2.2 branch). Before that, it looks like debugger support was optional and rather broken - but I've not taken the time to dig carefully through ancient history. Eivind.
- Fix for ssh-1.2.27 symlink/bind problem Scott Gifford
- Re: Fix for ssh-1.2.27 symlink/bind problem Eivind Eklund
- Re: Fix for ssh-1.2.27 symlink/bind problem Scott Gifford
- Re: Fix for ssh-1.2.27 symlink/bind problem Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bind proble... Markus Friedl
- Re: Fix for ssh-1.2.27 symlink/bind p... Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bi... Markus Friedl
- Re: Fix for ssh-1.2.27 symlin... Wietse Venema
- Re: Fix for ssh-1.2.27 symlin... Casper Dik
- Re: Fix for ssh-1.2.27 symlin... Eivind Eklund
- Re: Fix for ssh-1.2.27 symlin... Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bi... Markus Friedl
- Re: Fix for ssh-1.2.27 symlin... Wietse Venema
- Re: Fix for ssh-1.2.27 symlink/bind problem Casper Dik
- Re: Fix for ssh-1.2.27 symlink/bind proble... Phillip Vandry
- Re: Fix for ssh-1.2.27 symlink/bind problem Toomas Kiisk
- Re: Fix for ssh-1.2.27 symlink/bind problem Olaf Seibert
- Re: Fix for ssh-1.2.27 symlink/bind problem Scott Gifford
- Re: Fix for ssh-1.2.27 symlink/bind problem Dan Astoorian
