Another cool attack on this mechanism is if the binary uses shared
libraries: modify LD_LIBRARY_PATH so that its favorite shared library is
your own version of the library, that proceeds to dump the entire
application to disk when executed.

The challenge of adding additional sandbox/restrictions outside of the
traditional uid boundaries in UNIX is challenging.  The number of ways to
influence a programs execution is quite sizable...

On Sun, 25 Jul 1999 jko...@freebsd.org wrote:

> 
> 
> jk> Yes, but /if/ KTRACE is present, today's code allows you to bypass
> jk>the lack of read permissions on an executable.  That shouldn't be
> jk>allowed.  The current behaviour could be regarded as a security
> jk>hole actually :).
> 
> sef> No more so than core dumps do.
> 
> Yes, but an application can protect itself from an inadvertent core dump.
> It can't (today) against being ktrace'd.
> 
> sef> I vote strongly against this change.
> 
> Noted, thanks.
> 
> I will summarize the result of the discussion in a followup to kern/3546.
> 
> Regards,
> Koshy
> 
> 
> 
> 
> To Unsubscribe: send mail to majord...@freebsd.org
> with "unsubscribe freebsd-hackers" in the body of the message
> 


  Robert N M Watson 

rob...@fledge.watson.org              http://www.watson.org/~robert/
PGP key fingerprint: AF B5 5F FF A6 4A 79 37  ED 5F 55 E9 58 04 6A B1
TIS Labs at Network Associates, Computing Laboratory at Cambridge University
Safeport Network Services



To Unsubscribe: send mail to majord...@freebsd.org
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to