Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 09 Dec 96 14:04:50 -0800
From:      Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca>
To:        Ben Black <black@squid.gage.com>
Cc:        cschuber@uumail.gov.bc.ca, bmk@pobox.com, security@freebsd.org
Subject:   Re: Running sendmail non-suid 
Message-ID:  <199612092204.OAA18326@passer.osg.gov.bc.ca>
In-Reply-To: Your message of "Mon, 09 Dec 96 15:34:29 CST." <9612092134.AA16236@squid.gage.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
On the surface this appears be the case, however if you NFS export a
filesystem that contains files owned by the smtp user, especially to a
system where someone else has root, you open your system to root compromise.

If you do manage all of your NFS clients, you will need to make the same
change or risk being hacked via a setuid-root sendmail on the client.

If NFS would map all administrative accounts to nobody, I think you might be
reasonably safe.  The only NFS server I know that does this is Linux NFS
server.


Regards,                       Phone:  (250)387-8437
Cy Schubert                    OV/VM:  BCSC02(CSCHUBER)
Open Systems Support          BITNET:  CSCHUBER@BCSC02.BITNET
ITSD                        Internet:  cschuber@uumail.gov.bc.ca
                                       cschuber@bcsc02.gov.bc.ca

		"Quit spooling around, JES do it."

> >The general consensus has usually been that this approach is less secure  
> >because it is easier to gain access to a user account than root.
> 
> this still makes no sense at all.  explain it, please.  why would a user  
> account managed just like the root account be any easier to hack?
> 
> 
> 
> b3n



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199612092204.OAA18326>