Fri Oct 29 10:02:09 2010: Request 62552 was acted upon.
Transaction: Correspondence added by arost
       Queue: PAR-Packer
     Subject: disabling taint mode (or: passing options from PERLRUN(1))
   Broken in: (no value)
    Severity: Wishlist
       Owner: Nobody
  Requestors: bitc...@post2.25u.com
      Status: open
 Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=62552 >


On Fri Oct 29 09:36:39 2010, RSCHUPP wrote:
> On 2010-10-29 06:47:11, arost wrote:
[...]
> >    * and reviewing about 50 KLOC for securing a script on a system
> where everyone has root access anyway doesn't look like a rewarding
> activity.
> 
> So don't expect us to the same job for PAR::Packer. 

I absolutely don't. I'm willing to take the same risk that I take with 
normal "perl -U". The problem is that PAR::pp does not allow me to do 
that, since I there is not a way (?) to specify unsafe mode for pp 
binaries.

> >    * the script is used on systems where every user has root access
> 
> Oh boy :(  If that's really the case, I suggest you simply 
> don't make the binary setuid, but run it under sudo instead.

We do this right now, but it leads to a mess from mixing user and root  
permissions/ownerships on all input and output data of the script. I'd 
really like to avoid that.

(For background: I see that a "everyone gets root" system is unusual. 
The system is used for network tests, and users must be able to perform 
changes to hard- and software on a regular basis.)

Reply via email to