Re: /tmp exploits

1998-04-23 Thread joost witteveen
In an attempt to save the world from disaster, Manoj Srivastava wrote: > Hi, > >>"Ian" == Ian Jackson <[EMAIL PROTECTED]> writes: > > Ian> I think noone, even humans, should type `echo blah > /tmp/junk'. > Ian> Make a directory named after your userid, or use your home > Ian> directory, or somethi

Re: /tmp exploits

1998-04-22 Thread Stephen Carpenter
-BEGIN PGP SIGNED MESSAGE- I think you are missing th epoin there somewhat. I belive the original intent was NOT to modify libc so that /tmp exploits are impossible as a be-all and end-all solution The idea was to modify libc so that anything which used /tmp in blatantly unsafe ways (I

Re: /tmp exploits

1998-04-21 Thread bear
> On Mon, Apr 20, 1998 at 11:47:20PM -0700, Guy Maor wrote: >> Modifying libc to catch common security goals is a laudable goal, but >> such a libc should go to experimental. This may be a stupid question, but *what* /tmp exploit are we trying to fix? I ask solely because /tmp should already hav

Re: /tmp exploits

1998-04-21 Thread Riku Voipio
On Mon, Apr 20, 1998 at 11:47:20PM -0700, Guy Maor wrote: > Modifying libc to catch common security goals is a laudable goal, but > such a libc should go to experimental. Why change libc? Isn't there a kernel patch that makes /tmp safe? Why isn't no-one using it? -- Joh 3:16 -- To UNSUBSCRIBE

Re: /tmp exploits

1998-04-21 Thread Carey Evans
Ian Jackson <[EMAIL PROTECTED]> writes: > We should modify our libc so that opening a file in /tmp or /var/tmp - > determined by simple string comparison of the filename passed to > open(2) - fails if O_CREAT is specified without O_EXCL. You also need to check whether the current directory is /tm

Re: /tmp exploits

1998-04-21 Thread Guy Maor
I agree with Manoj here. Modifying libc to catch common security goals is a laudable goal, but such a libc should go to experimental. Guy -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: /tmp exploits

1998-04-21 Thread Nicolás Lichtmaier
> I think we should stay away from delibrate non-compliance, > even for laudable goals such as these. An experimental non-conformant > libc (which I can install on a test system) is not something I shall > object to. Why not doing this: Each program when started, whe libc is initialized

Re: /tmp exploits

1998-04-20 Thread Jim Pick
Ian Jackson <[EMAIL PROTECTED]> writes: > We should modify our libc so that opening a file in /tmp or /var/tmp - > determined by simple string comparison of the filename passed to > open(2) - fails if O_CREAT is specified without O_EXCL. > > We should do this in slink. That way almost any progr

Re: /tmp exploits

1998-04-20 Thread Manoj Srivastava
Hi, >>"Ian" == Ian Jackson <[EMAIL PROTECTED]> writes: Ian> I think noone, even humans, should type `echo blah > /tmp/junk'. Ian> Make a directory named after your userid, or use your home Ian> directory, or something. Right. But my machine, my rules -- and this proposal would change the

Re: /tmp exploits

1998-04-20 Thread Ian Jackson
Manoj Srivastava writes ("Re: /tmp exploits"): ... > I think I would want echo blah > /tmp/junk nto to start > failing on my just because there is a file called junk already > in there. Modifying libc is too deep rooted a change; and modifes the > semantics o

Re: /tmp exploits

1998-04-20 Thread Manoj Srivastava
Hi, >>"Ian" == Ian Jackson <[EMAIL PROTECTED]> writes: Ian> We should modify our libc so that opening a file in /tmp or Ian> /var/tmp - determined by simple string comparison of the filename Ian> passed to open(2) - fails if O_CREAT is specified without O_EXCL. I think I would want echo b

Re: /tmp exploits

1998-04-20 Thread Anthony Towns
On Mon, Apr 20, 1998 at 01:20:10PM +0100, Ian Jackson wrote: > We should modify our libc so that opening a file in /tmp or /var/tmp - > determined by simple string comparison of the filename passed to > open(2) - fails if O_CREAT is specified without O_EXCL. This should only be files directly unde

Re: /tmp exploits

1998-04-20 Thread Avery Pennarun
On Mon, Apr 20, 1998 at 01:20:10PM +0100, Ian Jackson wrote: > We should modify our libc so that opening a file in /tmp or /var/tmp - > determined by simple string comparison of the filename passed to > open(2) - fails if O_CREAT is specified without O_EXCL. > > We should do this in slink. That

/tmp exploits

1998-04-20 Thread Ian Jackson
We should modify our libc so that opening a file in /tmp or /var/tmp - determined by simple string comparison of the filename passed to open(2) - fails if O_CREAT is specified without O_EXCL. We should do this in slink. That way almost any program with a /tmp security hole will stop working strai