On Tue, Mar 15, 2016 at 3:52 PM, Kamil Cholewiński <harry6...@gmail.com>
wrote:
> setgid is setgid, you give unprivileged users an executable they can
> play with.

... and a successful hack means that they can corrupt the score file.

> A daemon can open a descriptor to the score file at startup, chroot,
> drop privileges, and only then start accepting connections.

Which leads to:

> I can't think of a way a networked setgid could ever be possible.
> Ultimately it means the score server would have to somehow trust the
> input from whichever program is sending the score.

I can think of ways a networked setgid could be made to work, but each
involves significant hassle and annoyance.

That said, I can think of another networked approach which should work
fine for low volume use (but winds up being vulnerable to spam attacks
- and of course is significantly more complicated than setgid).

But what's so bad about giving unprivileged users an executable they
can play with, in this specific case? Personally, I can think of more
important things to worry about...

--
Raul

Reply via email to