On Wed, Mar 11, 2009 at 3:22 PM, Nick Zitzmann <n...@chronosnet.com> wrote:
> What it's saying is AEWP() will run pretty much anything you tell it to run.
> That is not always a good thing, because the secure tool can be swapped by
> some malware, which would cause AEWP() to run the wrong tool. This is one of
> the few cases where running a tool as setuid root actually makes sense,
> since the tool can't be swiped without permission. There used to be problems
> with this, but they were resolved a long time ago.

Of course, you still have to call AEWP to make it suid root, and
things can be taken over at that time. Using a suid root tool reduces
your exposure to AEWP, but doesn't eliminate it.

Overall, the way I see it, trying to use AEWP safely is like
installing triple locks on the door to a house with no walls. There
are *so* many ways a piece of evil software can gain root privileges
without exploiting a race condition in some other program's use of
AEWP. Not to mention, root is overrated anyway: all root does is allow
the evil process to fiddle with system files that nobody really cares
about. Deleting the user's documents and swiping their credit card
numbers can be done without any elevated privileges at all.

Mike
_______________________________________________

Cocoa-dev mailing list (Cocoa-dev@lists.apple.com)

Please do not post admin requests or moderator comments to the list.
Contact the moderators at cocoa-dev-admins(at)lists.apple.com

Help/Unsubscribe/Update your Subscription:
http://lists.apple.com/mailman/options/cocoa-dev/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to