Bug#427605: ITP: privbind -- Allow unprivileged apps to bind to a privileged port

2007-06-06 Thread Russell Coker
On Tuesday 05 June 2007 16:52, Shachar Shemesh [EMAIL PROTECTED] wrote:
 Package: wnpp
 Severity: wishlist
 Owner: Shachar Shemesh [EMAIL PROTECTED]

What benefits does this offer over authbind which has been in Debian for ages?

-- 
[EMAIL PROTECTED]
http://etbe.coker.com.au/  My Blog

http://www.coker.com.au/sponsorship.html Sponsoring Free Software development



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#427605: ITP: privbind -- Allow unprivileged apps to bind to a privileged port

2007-06-06 Thread Shachar Shemesh
Russell Coker wrote:
 On Tuesday 05 June 2007 16:52, Shachar Shemesh [EMAIL PROTECTED] wrote:
   
 Package: wnpp
 Severity: wishlist
 Owner: Shachar Shemesh [EMAIL PROTECTED]
 

 What benefits does this offer over authbind which has been in Debian for ages?

   
It uses a (I think) much more secure mode of operation. In particular:
- No SUID executables
- User who launches the daemon must be root
- Privileges go down, never up
And, as a result:
- No global configuration necessary (though one will probably be added
later if necessary).

Shachar


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#427605: ITP: privbind -- Allow unprivileged apps to bind to a privileged port

2007-06-06 Thread Russell Coker
On Wednesday 06 June 2007 20:05, Shachar Shemesh [EMAIL PROTECTED] wrote:
  What benefits does this offer over authbind which has been in Debian for
  ages?

 It uses a (I think) much more secure mode of operation. In particular:
 - No SUID executables
 - User who launches the daemon must be root

Having a daemon instead of a SUID executable does not inherently make it more 
secure (there has been no shortage of exploits for bugs in daemons in the 
past).

 - Privileges go down, never up

The usual system is that a process with UID != 0 can not bind to ports below 
1024.  Breaking this involves increasing the privileges of some programs.

 And, as a result:
 - No global configuration necessary (though one will probably be added
 later if necessary).

How can there be no global configuration needed?  The sysadmin needs to decide 
which users are granted the privilege to bind to low ports and which ports 
those users may bind to.

-- 
[EMAIL PROTECTED]
http://etbe.coker.com.au/  My Blog

http://www.coker.com.au/sponsorship.html Sponsoring Free Software development


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#427605: ITP: privbind -- Allow unprivileged apps to bind to a privileged port

2007-06-06 Thread Shachar Shemesh
Russell Coker wrote:
 On Wednesday 06 June 2007 20:05, Shachar Shemesh [EMAIL PROTECTED] wrote:
   
 What benefits does this offer over authbind which has been in Debian for
 ages?
   
Before I begin answering your questions, the bug report has a link to
technical explanation of how privbind is implemented. Have you read it?

 It uses a (I think) much more secure mode of operation. In particular:
 - No SUID executables
 - User who launches the daemon must be root
 

 Having a daemon instead of a SUID executable does not inherently make it more 
 secure (there has been no shortage of exploits for bugs in daemons in the 
 past).
   
s/daemon/program that needs low port binding/

privbind does not allow regular users to bind to low ports. Privbind
allows root to run program that bind to low port as non-root.
 The usual system is that a process with UID != 0 can not bind to ports below 
 1024.  Breaking this involves increasing the privileges of some programs.
   
Please read the privbind man page. It does not do what you think it does.
   
 And, as a result:
 - No global configuration necessary (though one will probably be added
 later if necessary).
 

 How can there be no global configuration needed?
Please read the privbind man page. It does not do what you think it does.
   The sysadmin needs to decide 
 which users are granted the privilege to bind to low ports and which ports 
 those users may bind to.
   
Please read the privbind man page. It does not do what you think it does.

Shachar


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#427605: ITP: privbind -- Allow unprivileged apps to bind to a privileged port

2007-06-05 Thread Shachar Shemesh
Package: wnpp
Severity: wishlist
Owner: Shachar Shemesh [EMAIL PROTECTED]


* Package name: privbind
  Version : 0.2
  Upstream Author : Shachar Shemesh [EMAIL PROTECTED]
* URL : http://sourceforge.net/projects/privbind
* License : GPL
  Programming Lang: C
  Description : Allow unprivileged apps to bind to a privileged port

This program allows running another program as a non-root user, except
the other program will be able to bind to privileged (1024) ports.

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-686
Locale: LANG=en_US, LC_CTYPE=he_IL (charmap=ISO-8859-8)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#427605: ITP: privbind -- Allow unprivileged apps to bind to a privileged port

2007-06-05 Thread martin f krafft
also sprach Shachar Shemesh [EMAIL PROTECTED] [2007.06.05.0852 +0200]:
 This program allows running another program as a non-root user, except
 the other program will be able to bind to privileged (1024) ports.

How? Could you include a short note on how it does this magic in
the description please?

-- 
 .''`.   martin f. krafft [EMAIL PROTECTED]
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems


signature.asc
Description: Digital signature (GPG/PGP)


Bug#427605: ITP: privbind -- Allow unprivileged apps to bind to a privileged port

2007-06-05 Thread Shachar Shemesh
martin f krafft wrote:
 How? Could you include a short note on how it does this magic in
 the description please?

   
I'll do (arguably) better. I'll link to a not so short description at
http://privbind.svn.sourceforge.net/viewvc/privbind/trunk/README?view=markup

In a nutshell, privbind uses a 100% user space approach that does not
rely on SUID executables or on global configs (unlike authbind).
Instead, a root process runs privbind, which drops privileges and runs
the actual program. Privbind does leave a root process behind, and wraps
the program run with a LD_PRELOAD library that intercepts the bind
call, and forwards its file descriptor through an open UNIX domain
socket to the root process, which carries out the actual bind.

Shachar


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]