Hi,

David Bremner <brem...@unb.ca> writes:
>      - I have a vague memory of this being discussed before, but I can't
>        find the discussion now.  As far as I can tell, there are several
>        ways in which the socket setup could be improved.
>
>        - I don't really understand why the permissions on
>          /tmp/socket-ts.$uid are group and world readable.
>
>        - having the socket in world writable location makes ts
>          vulnerable to a denial of service attack.

It can also lead to other security issues.  There should be enough
example in the bug tracker ("unsafe use of /tmp").

>        wouldn't it be better to put the socket in a mode 0700 directory
>        e.g. in the users home directory?

Please be aware that there are network filesystems that cannot handle
sockets in $HOME.  Also sockets (or symlinks to them) should include the
hostname in case $HOME is shared between multiple machines.

You can have a symlink to a socket somewhere else which can then have a
random name.  In case the real socket is in a world-writable directory,
you also need to check that it is still your socket and was not replaced
later (for example an attacker could recreate the socket after /tmp was
cleaned on reboot).  At least Chromium, Akonadi and KDE do this.

Ansgar



-- 
To UNSUBSCRIBE, email to debian-wnpp-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/87r53y3pmo....@deep-thought.43-1.org

Reply via email to