Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 18 Nov 1998 07:52:13 +1100
From:      Peter Jeremy <peter.jeremy@auss2.alcatel.com.au>
To:        security@FreeBSD.ORG
Subject:   Re: Would this make FreeBSD more secure?
Message-ID:  <98Nov18.075152est.40335@border.alcanet.com.au>

next in thread | raw e-mail | index | archive | help
Andre Albsmeier <andre.albsmeier@mchp.siemens.de> wrote:
>I just was alarmed by xlockmore that a program runs setuid root all the time
>only to check the password the user enters.
In the case of xlockmore (and similar programs), the logical approach
would seem to be to split the functionality into two processes: the
parent process remains privileged(*), but all it would do is seize the
keyboard/mouse, blank the screen and spawn children to actually display
the pretty patterns.  The children don't need to be priviledged, and if
one crashes, the parent can just start another.

An alternative approach would be to have the entire saver run non-
privileged and call a privileged program to check the password.
Securely writing the password checking program (so it couldn't be
used for password cracking) is non-trivial.

> And, regardless whether xlockmore
>has known bugs or not,
xlockmore-4.10 definitely does have bugs - several of the standard saver
modes will die with SIGFPE (suddenly unlocking your screen).

(*) Currently, this means setuid root, but all it needs is sufficient
    privileges to validate a password.

Peter

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?98Nov18.075152est.40335>