Since openntpd-portable allows configuring the privsep user, do a
couple of sanity checks at runtime to make sure the privsep user wasn't
configured as root.

This might be overkill.

---
 src/usr.sbin/ntpd/ntp.c | 6 ++++++
 1 file changed, 6 insertions(+)

diff --git a/src/usr.sbin/ntpd/ntp.c b/src/usr.sbin/ntpd/ntp.c
index 625364a..c8f095e 100644
--- a/src/usr.sbin/ntpd/ntp.c
+++ b/src/usr.sbin/ntpd/ntp.c
@@ -145,6 +145,12 @@ ntp_main(int pipe_prnt[2], int fd_ctl, struct ntpd_conf 
*nconf,
        conf = nconf;
        setup_listeners(se, conf, &listener_cnt);

+       if (pw->pw_uid == 0 || pw->pw_gid == 0)
+               fatal("privsep user cannot be root");
+
+       if (pw->pw_uid == geteuid() || pw->pw_gid == getegid())
+               fatal("privsep user cannot be the privileged user");
+
        if (setgroups(1, &pw->pw_gid) ||
            setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
            setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid))
--
1.9.1

Reply via email to