On Wed, Jun 20, 2001 at 12:02:47AM -0600, Hubert Chan wrote:
> be SUID, you're safer without it being SUID).  Is there any (sane) way
> of making it so that programs such as passwd, chsh, etc. don't need to
> be SUID?

Not really.  Not if you want to ensure that any of the data they can alter
passes sanity checks despite a malicious user, which is a case you certainly
have to allow for.  Putting the password into a file that the user owns also
allows a careless user to make it world-readable (or even writeable, eh?).

Nope.  SUID programs are a security risk because they offer interesting
power to those who can subvert them, but they are also the way Unix systems
extend restricted access to protected resources to non-root users.  Rather
than trying to eliminate them, which is almost certainly impossible without
adding something comparable to ACLs and a raft of systemic changes (to
segregate what are now fields in one record to be in separate, hence
separately access-controlled files, for example), we might want to consider
whether they could instead be implemented in a way that made them much less
likely to be exploitable.  The C language is a wonderful thing, but it
offers many subtle ways to err.

-- 
Truth in advertising is like leaven, which a woman hid in three
measures of meal.  It provides a suitable quantity of gas, with
which to blow out a mass of crude misrepresentations into a form
that the public can swallow.  - Dorothy Sayers, _Murder Must Advertise_


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to