Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20041022233823.GA1490@openwall.com>
Date: Sat, 23 Oct 2004 03:38:23 +0400
From: Solar Designer <solar@...nwall.com>
To: owl-users@...ts.openwall.com
Subject: Re: sudo: why not?

Nico,

On Fri, Oct 22, 2004 at 02:32:37PM +0200, Nico -telmich- Schottelius wrote:
> Solar Designer [Wed, Oct 20, 2004 at 11:55:16PM +0400]:
> > [su and sudo security problems]
> 
> Well, this is not a problem anymore, if you use enhanced
> kernel security. For instance using RSBAC (www.rsbac.org)
> one can define exaclty what program and which user may use
> setuid from which uid to which uid.

RSBAC is great, but I feel that you've missed the point.  If it would
be permitted for a non-root user to su to root, then anyone who could
have compromised the user's account[1] would also be able to hijack a
su session[2] and then su to root himself.  This attack is not affected
by kernel policy enforcement in any way.

[1] Such a compromise could occur in a variety of ways: Web/FTP/etc.
client vulnerabilities, password snooping, etc.

[2] For example, edit the user's shell startup scripts to make su an
alias for a custom su wrapper program.

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.