I had written:
> Oh yes, there's a 3rd choice - believe the UID that's
> stuffed into the kernel.  Since this can only be set by
> certain administrative programs (ie, login), this should
> normally be whatever value is in the password file, which
> is perfectly adequate security if what you're trying to secure
> is data that's stored on the local machine.  If you are
> instead trying to secure a network resource, you may want
> to think through your security model very carefully.

Nathan Neulinger <[EMAIL PROTECTED]> replied:

> I don't believe this is the case... As near as I can tell, anyone can issue 
> the GetToken and SetToken calls. 
> 
> In fact, for a while, I had a couple of little programs sitting around 
> that would take your current tokens and convert to a easily transportable 
> ASCII string, and another one that would take the string and set your 
> current token from it. Neither required any special privileges. 

Yes, you are right, but that's not quite what I meant.  I didn't
mean the vice ID associated with the token, which is indeed
easily spoofed.  I meant the process UID set by setuid/setreuid & etc.,
which is part of the standard Unix security model.  I should have said
that more clearly.

                        -Marcus Watts
                        UM ITD PD&D Umich Systems Group

Reply via email to