On Wed, 2005-09-28 at 09:38 +0200, Luca Dionisi wrote:
> The security benefit is on the fact that when you run the
> executable as a normal user (since it can't be a root suid executable)
> it runs as an unprivileged process.
> If the executable goes to the /etc/rc.d/rc[1..5] ... directories,
> on the other hand, not only it is run always at the boot of the
> system, but -which is a bigger security hole- it becomes a
> privileged process.

Doesn't matter. If a malicious package can already install to
directories in $PATH, it can replace or override an existing program
already being run by the scripts you're trying to secure.

For instance, one of the first things /etc/rc.d/init.d/rc does is run
'stty sane'.  Replace the stty command with a something malicious, and
it doesn't matter how well secured the boot scripts are.

Simon.

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
http://linuxfromscratch.org/mailman/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to