Ben Collins wrote:

> On Mon, Nov 16, 1998 at 04:30:02PM -0500, Peter S Galbraith wrote:
> >                                     If we simply put users in group `disk',
> > this creates a security hole since they will have read-access to raw scsi
> > disks other than the zip and jaz disk.
> 
> And having it suid root _doesn't_ give them even more access to read raw
> scsi devices as well as just about anything else on the system? I'm not
> sure about you, but i wouldn't want a fairly newly developed program to be
> suid on my system.

To be fair, jazip has existed (and has been used extensively) for _years_
now, so it's not new (only new to Debian).

> I think group disk was implemented for just this type of situation, and
> would work fine based on your description. Also it would not allow them
> access to disks which aren't jaz since you already said that it implements
> some sort of check for this.

Yes, jazip does check this.  But if we add a user to the disk group, that
user gets read access to raw disk devices _outside_ of jazip, right?  If we
don't do that, and leave jazip suid root to do its own security, then users
don't need nor do they get read-access to all raw disk devices (from which,
I assume, they could `dd' the contents over to a file and read files they
don't otherwise have access to).

Unless I'm missing something, I think that adding users to group disk is
bad.  I think trusting jazip to be secure is a better solution.  However,
the most secure thing to do would be to:

 - create a new `jazip' group.
 - put selected users in that group to use jazip.
 - change the group ID of zip or jaz raw scsi device to `jazip' and make
   it group `rw'.

This way, users do _not_ get read access to all raw disk devices.
Unless we are willing to do this, I think I should leave jazip suid-root.

>                              Plus if they are sitting in front of the
> system (which they need to be to use a zip drive) they have 'extended'
> access any way, 

True...
>                 why make add another suid binary that isn't necessary?

Because adding users to the `disk' group is worse security.  Or am I
missing something?

BTW, the jazip author is very open to discussing this.  He very security
concious, has thought a lot about this, and has not received a suid-exploit
bug report since releasing this software.

Thanks for your interest, opinions and advice.

(Do I get final say as package maintainer?  Or do suid-root binaries
 require special permissions from Debian guru developers?)
-- 
Peter Galbraith, research scientist          <[EMAIL PROTECTED]>
Maurice Lamontagne Institute, Department of Fisheries and Oceans Canada
P.O. Box 1000, Mont-Joli Qc, G5H 3Z4 Canada. 418-775-0852 FAX: 775-0546
    6623'rd GNU/Linux user at the Counter - http://counter.li.org/ 

Reply via email to