Date: Mon, 09 Dec 96 14:04:50 -0800 From: Cy Schubert - ITSD Open Systems Group <cschuber@uumail.gov.bc.ca> To: Ben Black <black@squid.gage.com> Cc: cschuber@uumail.gov.bc.ca, bmk@pobox.com, security@freebsd.org Subject: Re: Running sendmail non-suid Message-ID: <199612092204.OAA18326@passer.osg.gov.bc.ca> In-Reply-To: Your message of "Mon, 09 Dec 96 15:34:29 CST." <9612092134.AA16236@squid.gage.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On the surface this appears be the case, however if you NFS export a filesystem that contains files owned by the smtp user, especially to a system where someone else has root, you open your system to root compromise. If you do manage all of your NFS clients, you will need to make the same change or risk being hacked via a setuid-root sendmail on the client. If NFS would map all administrative accounts to nobody, I think you might be reasonably safe. The only NFS server I know that does this is Linux NFS server. Regards, Phone: (250)387-8437 Cy Schubert OV/VM: BCSC02(CSCHUBER) Open Systems Support BITNET: CSCHUBER@BCSC02.BITNET ITSD Internet: cschuber@uumail.gov.bc.ca cschuber@bcsc02.gov.bc.ca "Quit spooling around, JES do it." > >The general consensus has usually been that this approach is less secure > >because it is easier to gain access to a user account than root. > > this still makes no sense at all. explain it, please. why would a user > account managed just like the root account be any easier to hack? > > > > b3n
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199612092204.OAA18326>