On Mon, Aug 23, 2004 at 12:32:10PM +0200, Joerg Schilling wrote:
> Jacob Meuser <[EMAIL PROTECTED]> wrote:
> 
> > On Fri, Aug 20, 2004 at 03:49:28PM +0200, Joerg Schilling wrote:
> >
> > > How do you believe that you may run cdrecord without root privs without
> > > compromising the security of the whole system?
> >
> > On OpenBSD, members of the operator group are allowed to reboot the
> > system, change tapes ... normal things that someone trusted to operate
> 
> ....
> 
> > But having suid binaries gives _anyone_ the possibility of escalating
> > to root.  This has already happened to the very software we are
> > talking about.
> >
> > Using the suid bit takes away all the fine grained "access control".
> 
> It looks like OpenBSD does not have fine grrained access control but did rather
> add unwanted spacial group behavior into the kernel.

There's nothing "special" added to the kernel.  It's just the same old
group "access control" that's been with UNIX-like operating systems since
long ago.

> On Solaris 10, you may use RBAC together with getppriv()/setppriv() to really 
> have fine grained role based rights.
> 
> On a non "trusted" Variant, there is /usr/bin/pfexec that calls the programs
> with just the rights they need.
> 
> J�rg
> 
> -- 
>  EMail:[EMAIL PROTECTED] (home) J�rg Schilling D-13353 Berlin
>        [EMAIL PROTECTED]              (uni)  If you don't have iso-8859-1
>        [EMAIL PROTECTED]      (work) chars I am J"org Schilling
>  URL:  http://www.fokus.fraunhofer.de/usr/schilling ftp://ftp.berlios.de/pub/schily


-- 
<[EMAIL PROTECTED]>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to