On Sat, 6 Nov 1999, Warner Losh wrote:

> There are ways that the user can see the code to execute it, but not
> read it normally.  procfs breaches this inability to read the file.
> Also, there are many related problems which make a proper fix for this
> that is more complicated than removing /proc/xxx/file nearly
> impossible.  "Proper" here means "A fix which will prevent the
> disclosure of a file to unauthorized people which would normally not
> be able to read the file."
> 
> I'm convinced that it would be hard to codify all the security checks
> needed to access the file originally into a single number which would
> allow people that could read the original file to read /proc/xxx/file
> and disallow people who couldn't read the file to also be disallowed
> from reading /proc/xxx/file.

It sounds to me that what you really want are the semantics of a
symbolic link and not the semantics of a hard link.  Is it just me,
or does it seem as if the pathname of the executable being stored as
a virtual symlink in procfs as "file" would solve these security
problems?

-- 
 Brian Fundakowski Feldman           \  FreeBSD: The Power to Serve!  /
 [EMAIL PROTECTED]                    `------------------------------'



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to