> I just find it odd from a practical view point that kern.nosuidcoredump
> no longer applies, though understand from a security view point that one
> would want to avoid slip ups by the developer between setuid and seteuid
> or in forgetting to restore the setting to a secure mode after debugging.

Sorry, but that underestimates the danger.

A process which has operated as multiple uids _always_ is doing so because
it is mixing up domains of operation; it has some capability which it is
trying to hide or block.

Some capabilities are sockets or ports or such which only root or some
other uid could open but which can continue to be used afterwards, but
the other type of capabilities represent themselves in memory, and
are typically a secret, even if only by the addresses of the block of
data.

Such memory should never end up on disk, in a file.

It is easy to talk about more sophisticated models for turning such
things on and off, and that's great, but then what do the other
systems do with these fancy options?

They leave them turned off.  To avoid mails like yours.

So nothing is gained.

Instead, as a group our policy is to turn these things on, not make it
easy for them to be turned off, and thus enforce the policy strictly,
and thereby we educate people using these functions to get used to the
choices they should be making in security software.  If we don't make
them aware, they will remain blissfully aware and think they are smart
enough to write setuid or daemon software.

Reply via email to