>On 9 Aug 99, at 10:38, Ken Jones wrote:
> > The best solution i've seen is to group all the programs
> > that are possible security holes, like in.telnet and compilers,
> > to a new group. And only allow members of that group to execute
> > the programs.
> >
> > Just like all the suid programs should be grouped.
> >
> > It's a pretty standard security lockdown method.


The alternative is the reverse of that. Make all programs inaccessible and
selectively allow execute access to known good programs.



>What prevents me to upload binaries into my home
>directory/subdirectories, like ~/Maildir/tmp? (Other than carefully
>controlled ftp access?)


Some OSes support mount -noexec which means the OS will not run an
executable from that mount point. /home, /var and /tmp all are good
candidates for those systems that allow it.

Another option as someone alluded to earlier is to have a MAILHOME which is
where qmail looks for .qmail files. You can use qmail/users to define this,
then you allow very restricted access to that directory such that the .qmail
files are always in a known state. Typically this is done via a webpage that
has options like "Set forward" address, "Set vacation" and "set -address"
rather than "place data in a .qmail file".

Yet another option is to modify the shell so that it only allows execution
of certain programs/paths. I've modified bash and used it as a /bin/sh with
success in this sort of circumstance.

Yet another option is a one-line change in qmail-local to use a different
shell.

All of this is work, some of which requires real Sysadmin skills and real
programming skills, but the capability is there for those who want to bother.


Regards.

Reply via email to