From: Bennett Haselton <benn...@peacefire.org>

> On 1/10/2012 2:02 AM, Adrian Sevcenco wrote:
>>  UsePrivilegeSeparation
>>  Specifies whether sshd(8) separates privileges by creating an 
>>  unprivileged child process to deal with incoming network traffic. 
>>  After successful authentication, another process will be created that 
>>  has the privilege of the authenticated user.  The goal of privilege 
>>  separation is to prevent privilege escalation by containing any 
>>  corruption within the unprivileged processes.  The default is 
> ``yes''. 
> OK.  So it sounds like if you found a particular exploit in sshd that 
> could *only* do certain things -- like write a file to an arbitrary 
> location on disk -- then this privilege separation would prevent that 
> exploit from being used to make the child process write somewhere that 
> it didn't have privileges to write to.

Do a ps and look at the sshd tree.  Example:
root      6014  0.0  0.1  97816  3760 ?        S    11:01   0:00  \_ sshd: bob 
[priv]
bob       6029  0.0  0.0  97816  1796 ?        S    11:01   0:00      \_ sshd: 
bob@pts/2 
bob       6030  0.0  0.0 108392  1760 pts/2    Ss   11:01   0:00          \_ 
-bash

The sshd child is running as bob; so it has bob (and not root) rights...

JD
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to