Russ Allbery <[EMAIL PROTECTED]> writes on 8 September 1999 at 16:13:46 -0700
 > Ken Jones <[EMAIL PROTECTED]> writes:
 > 
 > > The best solution i've seen is to group all the programs that are
 > > possible security holes, like in.telnet and compilers, to a new
 > > group. And only allow members of that group to execute the programs.
 > 
 > If you go that direction, you don't want to do it that way.  Instead, you
 > group all the programs that you're pretty sure *aren't* possible security
 > holes and you remove people's ability to execute anything else.
 > 
 > And as other people mentioned, if you take this route, you also need to
 > make sure that your users don't have write access to any file system
 > mounted without -noexec.  And make sure that they can't execute any
 > interpretor, since you can execute interpreted programs even from a
 > -noexec file system.  And... um... they'd better not have shell access
 > then.  And....

I've seen discussion on BUGTRAQ recently pointing out that you can
often use ld.so to execute things on non-executable partitions, and
people saying that noexec shouldn't be considered a security
mechanism.  If it ain't a security mechanism, I haven't a clue what it
could be good for.  If it isn't a *working* security mechanism, it
should either be fixed or removed; as long as it's sitting there,
people will try to use it as a security mechanism.

Another way around it I've thought of is that, if you have a shell
account, with many shells you can "source" a script without that
script having to be executable.  Since you can write nearly anything
as a shell script, this gives yet another way to get around
restrictions. 

 > This isn't an easy thing to do.

As you say.
-- 
David Dyer-Bennet         ***NOTE ADDRESS CHANGES***          [EMAIL PROTECTED]
http://dd-b.lighthunters.net/ (photos) Minicon: http://www.mnstf.org/minicon
http://www.dd-b.net/dd-b (sf) http://ouroboros.demesne.com/ Ouroboros Bookworms
Join the 20th century before it's too late!

Reply via email to