On Sat, May 11, 2002 at 06:02:18PM -0700, Thomas Bushnell, BSG wrote:
> Marcus Brinkmann <[EMAIL PROTECTED]> writes:
> 
> > I think it is absolutely mandatory that we establish the PID in a
> > trustworthy way rather than let the user provide some unique ID on its own.
> > I think there is already a place in the Hurd where we should do that but
> > don't (wasn't that term's term_open_ctty?), and there are all sort of simple
> > attacks possible if we can't trust the PID (eg a monitor server might check
> > for stale advisory locks and kill processes that don't release them timely. 
> > In the untrusted model, a user could make this monitor process kill
> > arbitrary processes on the system).
> 
> Nope; a malicious filesystem could just return bogus PID values too.

Mmh, we could restrict the monitor to trusted filesystems (eg /).
 
> I don't think this is a serious security issue, actually.  Such a
> monitor depends on an awful lot--it's not a strict Posix program
> already.

I am not really particularly attached to my example, it was just one of the
first that came to my mind.  Are you suggesting with "I don't think that
this is a serious security issue" that relying on a PID provided by the user
is good enough in the general case?  Or were you only relating this to my
example?

Thanks,
Marcus 

-- 
`Rhubarb is no Egyptian god.' Debian http://www.debian.org [EMAIL PROTECTED]
Marcus Brinkmann              GNU    http://www.gnu.org    [EMAIL PROTECTED]
[EMAIL PROTECTED]
http://www.marcus-brinkmann.de

_______________________________________________
Bug-hurd mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/bug-hurd

Reply via email to