Re: [PATCH] more SAK stuff

2001-07-06 Thread David Wagner
>More interestingly, it changes the operation of SAK in two ways: >(a) It does less, namely will not kill processes with uid 0. I think this is bad for security. (I assume you meant euid 0, not ruid 0. Using the real uid for access control decisions is a very odd thing to do.) - To unsubscribe

The SUID bit (was Re: [PATCH] more SAK stuff)

2001-07-06 Thread Rob Landley
On Thursday 05 July 2001 21:45, Albert D. Cahalan wrote: > Oh, cry me a river. You can set the RUID, EUID, SUID, and FUID > in that same parent process or after you fork(). Okay, I'll bite. The file user ID is fine, the effective user ID is what the suid bit sets to root of course, the saved

The SUID bit (was Re: [PATCH] more SAK stuff)

2001-07-06 Thread Rob Landley
On Thursday 05 July 2001 21:45, Albert D. Cahalan wrote: Oh, cry me a river. You can set the RUID, EUID, SUID, and FUID in that same parent process or after you fork(). Okay, I'll bite. The file user ID is fine, the effective user ID is what the suid bit sets to root of course, the saved

Re: [PATCH] more SAK stuff

2001-07-06 Thread David Wagner
More interestingly, it changes the operation of SAK in two ways: (a) It does less, namely will not kill processes with uid 0. I think this is bad for security. (I assume you meant euid 0, not ruid 0. Using the real uid for access control decisions is a very odd thing to do.) - To unsubscribe

Re: [PATCH] more SAK stuff

2001-07-05 Thread Albert D. Cahalan
Rob Landley writes: > Off the top of my head, fun things you can't do suid root: ... > ps (What the...? Worked in Red Hat 7, but not in suse 7.1. > Huh? "suid-to apache ps ax" works fine, though...) The ps command used to require setuid root. People would set the bit by habit. > I keep

Re: [PATCH] more SAK stuff

2001-07-05 Thread Rob Landley
On Monday 02 July 2001 15:10, Hua Zhong wrote: > -> From Alan Cox <[EMAIL PROTECTED]> : > > > (a) It does less, namely will not kill processes with uid 0. > > > Ted, any objections? > > > > That breaks the security guarantee. Suppose I use a setuid app to confuse > > you into doing something ? >

Re: [PATCH] more SAK stuff

2001-07-05 Thread Albert D. Cahalan
Rob Landley writes: Off the top of my head, fun things you can't do suid root: ... ps (What the...? Worked in Red Hat 7, but not in suse 7.1. Huh? suid-to apache ps ax works fine, though...) The ps command used to require setuid root. People would set the bit by habit. I keep bumping

Re: [PATCH] more SAK stuff

2001-07-05 Thread Rob Landley
On Monday 02 July 2001 15:10, Hua Zhong wrote: - From Alan Cox [EMAIL PROTECTED] : (a) It does less, namely will not kill processes with uid 0. Ted, any objections? That breaks the security guarantee. Suppose I use a setuid app to confuse you into doing something ? a setuid app

Re: [PATCH] more SAK stuff

2001-07-02 Thread Hua Zhong
-> From Alan Cox <[EMAIL PROTECTED]> : > > (a) It does less, namely will not kill processes with uid 0. > > Ted, any objections? > > That breaks the security guarantee. Suppose I use a setuid app to confuse > you into doing something ? a setuid app only changes euid, doesn't it? - To

Re: [PATCH] more SAK stuff

2001-07-02 Thread Kain
On Mon, Jul 02, 2001 at 02:16:36PM +0200, [EMAIL PROTECTED] wrote: > (a) It does less, namely will not kill processes with uid 0. > Ted, any objections? What if you have a process running wild as uid 0 (i.e. X server gone bad) that you need to die *right now*? -- "Don't dwell on reality; it

Re: [PATCH] more SAK stuff

2001-07-02 Thread Andries . Brouwer
>> (a) It does less, namely will not kill processes with uid 0. >> Ted, any objections? Alan: > That breaks the security guarantee. Suppose I use a setuid app to confuse > you into doing something ? On second thoughts I agree. Here is the patch without test for p->uid. Andries diff -u

Re: [PATCH] more SAK stuff

2001-07-02 Thread Andries . Brouwer
>> (a) It does less, namely will not kill processes with uid 0. >> Ted, any objections? Alan: > That breaks the security guarantee. Suppose I use a setuid app to confuse > you into doing something ? You confuse me? Unlikely :-) Indeed, discussion is possible. I think my version is more secure

Re: [PATCH] more SAK stuff

2001-07-02 Thread Alan Cox
> (a) It does less, namely will not kill processes with uid 0. > Ted, any objections? That breaks the security guarantee. Suppose I use a setuid app to confuse you into doing something ? - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to

[PATCH] more SAK stuff

2001-07-02 Thread Andries . Brouwer
Dear Linus, Alan, Ted, Andrew, all: (i) Andrew - why don't you add yourself to the CREDITS file? (then I'll find your email address at the first instead of the second attempt) (ii) Yesterday I complained about the fact that pressing SAK twice crashes the kernel (because the close from the first

Re: [PATCH] more SAK stuff

2001-07-02 Thread Kain
On Mon, Jul 02, 2001 at 02:16:36PM +0200, [EMAIL PROTECTED] wrote: (a) It does less, namely will not kill processes with uid 0. Ted, any objections? What if you have a process running wild as uid 0 (i.e. X server gone bad) that you need to die *right now*? -- Don't dwell on reality; it will

Re: [PATCH] more SAK stuff

2001-07-02 Thread Hua Zhong
- From Alan Cox [EMAIL PROTECTED] : (a) It does less, namely will not kill processes with uid 0. Ted, any objections? That breaks the security guarantee. Suppose I use a setuid app to confuse you into doing something ? a setuid app only changes euid, doesn't it? - To unsubscribe from

[PATCH] more SAK stuff

2001-07-02 Thread Andries . Brouwer
Dear Linus, Alan, Ted, Andrew, all: (i) Andrew - why don't you add yourself to the CREDITS file? (then I'll find your email address at the first instead of the second attempt) (ii) Yesterday I complained about the fact that pressing SAK twice crashes the kernel (because the close from the first

Re: [PATCH] more SAK stuff

2001-07-02 Thread Alan Cox
(a) It does less, namely will not kill processes with uid 0. Ted, any objections? That breaks the security guarantee. Suppose I use a setuid app to confuse you into doing something ? - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL

Re: [PATCH] more SAK stuff

2001-07-02 Thread Andries . Brouwer
(a) It does less, namely will not kill processes with uid 0. Ted, any objections? Alan: That breaks the security guarantee. Suppose I use a setuid app to confuse you into doing something ? You confuse me? Unlikely :-) Indeed, discussion is possible. I think my version is more secure and

Re: [PATCH] more SAK stuff

2001-07-02 Thread Andries . Brouwer
(a) It does less, namely will not kill processes with uid 0. Ted, any objections? Alan: That breaks the security guarantee. Suppose I use a setuid app to confuse you into doing something ? On second thoughts I agree. Here is the patch without test for p-uid. Andries diff -u --recursive