Renee Danson wrote:
> I also had some (perhaps naive) concerns about security in the design.
> I'm not a security expert, but the note about the service-provided
> ipf_method scripts being exec'ed as root set off alarm bells.  What's
> to stop someone from creating a rogue service whose ipf_method script
> creates rules that open up vulnerabilities, or that stomp on rules of
> other services?  Or (perhaps more likely) what about a service with a
> flawed script that accidentally causes such problems?

   ipf_method doesn't create any new vulnerabilities; the same service
   author that created the malicious ipf_method could have just as
   easily created a malicious start method that runs as root.

   This is why only an adequately authorized user is permitted to add
   new services to the system.

   Incidentally, this is also why ipf_method is defined in
   firewall_context instead of firewall_config.  If for some reason you
   did want to delegate firewall configuration (this clearly wouldn't be
   the case on Bill's systems :), you need the ability to permit the
   delgate to modify the service's firewall parameters without providing
   an avenue for privilege escalation.

   Dave

Reply via email to