On Wed, Oct 27, 1999 at 06:35:56PM -0400, Wietse Venema wrote:
> ssh starts up with the unprivileged real UID of the user; therefore
> setting the effective UID also to that of the user makes the process
> memory accessible for unprivileged access. This is how any reasonable
> UNIX system works, not just Solaris.

I disagree.  A reasonable system tracks whether a process has ever had
elevated privileges, and deny access to process memory (core dumps,
debugger attachments) if it has had.

If your system doesn't have this behaviour, that should (in my
opinion) be reported to the vendor as a bug.

>From the code, it seems FreeBSD has had correct behaviour for this
(for debugging) at least since rev 1.21 of sys/kern/sys_process.c
(1996/01/24, prior to the 2.2 branch).  Before that, it looks like
debugger support was optional and rather broken - but I've not taken
the time to dig carefully through ancient history.

Eivind.

Reply via email to