On Jan 6, 2008 8:34 PM, Carlo Calica <[EMAIL PROTECTED]> wrote:
> > > So what would happen in the above cron when using a uid/gid belonging
> > > to someone else.
> >
> > I think it would just work, as the uid/gid "was there".
>
> Yeah it should work.  May introduce a vulnerability through the shared
> uid/gid.  it would be horrible if cron shared  ids with apache.  I'd
> recommend a policy where fixed ids like that start at 99 and work down
> (avoid ISO shipped 0+, and dynamic 100-999).  May need to patch
> sources, but really the only secure choice.  Am I being paranoid?

That makes sense. Since there's no "well known ids" (except for the
super-user), I think that's fair. I've just made that change to the
patch.

> a nonsystem keyword for required_users?
>
> echo "$entry" | grep -q " nonsystem" && unset uid
>
> inserted appropriately should work.

I think it's better to disallow that. Normal user accounts shouldn't
be created automatically, IMO. Can you think of some case where that
would be necessary?

The new patch finds attached. More comments?

-- 
Lucas
powered by /dev/dsp

Attachment: Scripts-Requirements.patch
Description: Binary data

_______________________________________________
gobolinux-devel mailing list
gobolinux-devel@lists.gobolinux.org
http://lists.gobolinux.org/mailman/listinfo/gobolinux-devel

Reply via email to