Re: Unreadable binaries

2009-10-26 Thread Ikem Krueger
 I just saw this article about an effort to create Universal binary style ELF
 binaries for Linux, and I thought that this would be something to watch, so
 that Fedora could integrate both x86-32 and x86-64 into single DVD sets.
I don't suggest to do that. As already mentioned, that would double
the size of the distro/iso. I would use this technic only, if
neccessary.

About fat-elf in general: As long as it is optional, I am fine with
it. May it at compile time or after compiling by stripping binaries.
(I'd like to see both options.)

-- 
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Unreadable binaries

2009-10-26 Thread Ikem Krueger
Sorry. Wrong mail. ^^'

-- 
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Unreadable binaries

2009-10-22 Thread Stephen Smalley
On Thu, 2009-10-22 at 09:48 -0400, Adam Jackson wrote:
 On Thu, 2009-10-22 at 11:04 +0100, Richard W.M. Jones wrote:
  $ ll /usr/libexec/pt_chown 
  -rws--x--x 1 root root 28418 2009-09-28 13:42 /usr/libexec/pt_chown
  $ ll /usr/bin/chsh 
  -rws--x--x 1 root root 18072 2009-10-05 16:28 /usr/bin/chsh
  
  What is the purpose of making binaries like these unreadable?
  
  Originally I thought it was something to do with them being setuid,
  but there are counterexamples:
  
  $ ll /usr/bin/passwd 
  -rwsr-xr-x 1 root root 25336 2009-09-14 13:14 /usr/bin/passwd
 
 Historically, the kernel considers read permission on a binary to be a
 prerequisite for generating core dumps on fatal signal; which you
 typically want to prevent, since that becomes a way to read /etc/shadow.
 
 Pretty sure that's still the case, which means any u+s binaries with
 group/other read permission are bugs.

dumpable flag gets cleared for suid/sgid binaries (as well as for
non-readable binaries).

-- 
Stephen Smalley
National Security Agency

-- 
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list


Re: Unreadable binaries

2009-10-22 Thread Richard W.M. Jones
On Thu, Oct 22, 2009 at 09:59:00AM -0400, Stephen Smalley wrote:
 On Thu, 2009-10-22 at 09:48 -0400, Adam Jackson wrote:
  On Thu, 2009-10-22 at 11:04 +0100, Richard W.M. Jones wrote:
   $ ll /usr/libexec/pt_chown 
   -rws--x--x 1 root root 28418 2009-09-28 13:42 /usr/libexec/pt_chown
   $ ll /usr/bin/chsh 
   -rws--x--x 1 root root 18072 2009-10-05 16:28 /usr/bin/chsh
   
   What is the purpose of making binaries like these unreadable?
   
   Originally I thought it was something to do with them being setuid,
   but there are counterexamples:
   
   $ ll /usr/bin/passwd 
   -rwsr-xr-x 1 root root 25336 2009-09-14 13:14 /usr/bin/passwd
  
  Historically, the kernel considers read permission on a binary to be a
  prerequisite for generating core dumps on fatal signal; which you
  typically want to prevent, since that becomes a way to read /etc/shadow.
  
  Pretty sure that's still the case, which means any u+s binaries with
  group/other read permission are bugs.
 
 dumpable flag gets cleared for suid/sgid binaries (as well as for
 non-readable binaries).

Stephen, what would be your advice if I asked for these binaries to
become readable by non-root users?

[It's not crucial at the moment, however, just reduces the
effectiveness of febootstrap a little]

Rich.

-- 
Richard Jones, Virtualization Group, Red Hat http://people.redhat.com/~rjones
libguestfs lets you edit virtual machines.  Supports shell scripting,
bindings from many languages.  http://et.redhat.com/~rjones/libguestfs/
See what it can do: http://et.redhat.com/~rjones/libguestfs/recipes.html

-- 
fedora-devel-list mailing list
fedora-devel-list@redhat.com
https://www.redhat.com/mailman/listinfo/fedora-devel-list