On Mon, Aug 24, 2009 at 12:55, Richard Elling<richard.ell...@gmail.com> wrote:
>> Alice$ cd ~/proj1; ln -s /etc .,
>>
>> Alice$ echo "Hi helpdesk, Bob is on vacation and he has a bunch of
>> files in my home directory for a project that we are working on
>> together.  Unfortunately, his umask was messed up and I can't modify
>> the files in ~alice/proj1.  Can you do a 'chmod -fR a+rw
>> /home/alice/proj1' for me?  Thanks!" | mailx -s "permissions fix"
>
> Yeah, but that is just a social engineering attack.
> If you change chmod, you can just change the suggested
> command, and achieve similar results.
That's not the point.  There is indeed some social engineering at work
here, getting the admin to run chmod, but the point is the directory
/home/alice/proj1 looks innocent until one examines the contents.  So
unless the helpdesk notices the symlink to /etc/shadow somewhere in
that directory tree, the request contains no hint of malicious intent.

>> Helpdesk$ pfexec chmod -fR a+rw /home/alice/proj1
>>
>> Alice$ rm /etc/shadow
>> Alice$ cp myshadow /etc
>> Alice$ su -
>> root#
One could achieve the same result with a request to chmod a+rw
/etc/shadow, but this would be more noticeable.

One of my friends ran into this problem while trying to set an ACL on
his data files: chmod followed symlinks that he had created to his
home directory and config files in /etc, and broke his whole install.
I agree chmod should not follow symlinks.

Will
_______________________________________________
zfs-discuss mailing list
zfs-discuss@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/zfs-discuss

Reply via email to