If I may, both bastille and libpam-temp allow something similar for
`real users` ($TMP pointing to a temporary directory inside a user's
home) but /tmp is used more often by programs, cron (or other automation software, which would require trwxrwxrwx permissions and or doesn't use) in a directory /tmp is also used for file uploads in many web hosting systems (I put /tmp in a seperate filesystems just so I can put noexec on it, not to control space, which usually is a major pain) Also, anonymous ftp incoming usually "tries" to make sure users cannot read what is uploaded(only an admin can do that, theoretically) I'd consider exec flags on /tmp only if it was 0700 or 0000(which would negate the exec flags anyway, and might break software) (I normally mount /var/tmp and /usr/tmp using the bind mount options on top of the newly "somewhat a little more secure" /tmp) Does the lsb have anything to say about permissions for /tmp ? or mount flags for that matter? I think what Microsoft did and Debian didn't (yet?), was say "do not put temporary files for all applications using the hack of the +t(sticky flag) under /tmp in a shared directory, as that's not the debian way" :) P.S. I know that if users can upload arbitrary cgi's it's already not as secure as it could be What I'm trying to avoid is a remote non-root exploit allowing an attacker to put a binary in /tmp, which exploits a local root exploit, and roots the box. This precaution I try to use on all unix derivatives I work on(mostly Solaris, Debian, Redhat right now) Defense in depth, like all chains, starts at the weakest link... Jim Popovitch wrote: -----Original Message----- From: Matt Zimmerman Sent: Sunday, 13 July, 2003 23:56If the user can read files in /tmp, they can execute the code in them. What problem is noexec /tmp supposed to solve?Microsoft did a related thing a few years ago, they moved the TEMP directory to the users home directory in Win2K, etc. Is it time for Debian to do this? Note: I am not in any way implying that Debian is behind Microsoft. ;) -Jim P. |
- Re: execute permissions in /tmp Noah L. Meyerhans
- Re: execute permissions in /tmp Noah L. Meyerhans
- RE: execute permissions in /tmp Jim Popovitch
- Re: execute permissions in /tmp Peter Cordes
- Re: execute permissions in /tmp Peter Cordes
- Re: execute permissions in /tmp Noah L. Meyerhans
- Re: execute permissions in /tmp Peter Cordes
- Re: execute permissions in /tmp Phillip Hofmeister
- Re: execute permissions in /tmp Matt Zimmerman
- RE: execute permissions in /tmp Jim Popovitch
- Re: execute permissions in /tmp NN_il_Confusionario
- Re: execute permissions in /tmp bda
- Re: execute permissions in /tmp David Ramsden
- Re: execute permissions in /tmp Matt Zimmerman
- Re: execute permissions in /... bda
- Re: execute permissions in /... Matt Zimmerman
- Re: execute permissions in /... Phillip Hofmeister
- Re: execute permissions in /... Matt Zimmerman
- unsubscribe the intruder
- Re: execute permissions in /tmp Matt Zimmerman