On Mon, Jul 26, 1999, Nate Williams wrote:
> > > LD_LIBRARY_PATH, LD_PRELOAD and LD_DEBUG are ignored for setuid executables
> > > in FreeBSD.
> >
> > But the point being made is that they are not ignored for executables
> > which have no read access. And from there, read access can be gained,
> > because at that point, you have code running in the process's address
> > space.
>
> That's right. In other words, there really is no way of protecting
> executable files from being read if someone is motivated enough.
>
> And, in an open-source OS like FreeBSD, it's not a viable solution in
> any case....
The only option, as I've mentined previously in this thread,
that I can think of, would be to have an option when building
various linker code to disable searching in $LD_LIBRARY_PATH if
the library being looked for is in the standard library paths.
--
|Chris Costello <[EMAIL PROTECTED]>
|Is reading in the bathroom considered Multi-Tasking?
`----------------------------------------------------
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message