Hi,
some comments on the comments:

Johannes is of course right. If there were a
exploitable flaw in an implementation of a function,
then it would be better not to have an effective uid
0.
But you can't drop root privileges and then regain
them (as Johannes proposed) with setuid. You need the
(non-posix, BSD) seteuid for managing a task like
this.

Denis, the difference between sudo and the small C
program is that the C program doesn't need an
/etc/sudoers file (which could be deleted by an
attacker) or something similar for authentication. 

There are many things that can be improved, maybe
choosing a hash function which is even more time
consuming than MD5 and due to this more resistant to
wordbook-attacks and enumeration of passwords.

__________________________________________________________________

Gesendet von Yahoo! Mail - http://mail.yahoo.de
Sie brauchen mehr Speicher für Ihre E-Mails? - http://premiummail.yahoo.de

Reply via email to