Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 6 Feb 2001 01:09:43 -0800
From:      "Crist J. Clark" <cjclark@reflexnet.net>
To:        Terry Lambert <tlambert@primenet.com>
Cc:        Brett Glass <brett@lariat.org>, Rahul Siddharthan <rsidd@physics.iisc.ernet.in>, freebsd-chat@FreeBSD.ORG
Subject:   Re: UNIX-like approach to software and system architecture
Message-ID:  <20010206010943.H91447@rfx-216-196-73-168.users.reflex>
In-Reply-To: <200102060328.UAA08814@usr08.primenet.com>; from tlambert@primenet.com on Tue, Feb 06, 2001 at 03:28:44AM %2B0000
References:  <4.3.2.7.2.20010204080917.049ecca0@localhost> <200102060328.UAA08814@usr08.primenet.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Feb 06, 2001 at 03:28:44AM +0000, Terry Lambert wrote:

[snip]

> Actually, SCO had a fix for this a long time ago, where they
> had the ability to permit particular programs to do things,
> like bind reserved ports, as an attribute of the program (VMS
> did this too, with its concept of "installed images"), and
> not require that such programs run as root.  Adding this
> feature to FreeBSD would go a long way toward resolving the
> "root exploit" problem.

I think an even better fix is the option to do away with the
privileged ports altogether. Priv'ed ports also date back to the time
when "we were all friends..." Well, a lot of the idea of privileged
ports was that we are at least friends with the other administrators,
not necessarily their users. On the modern 'Net (Internet and most
intranets too) where any luser 0wnz their own box, the idea that one
can trust a privileged port more than any other an unknown machine is
ludicrous.

On a machine dedicated to doing DNS, webserving, or even a single-user
desktop, why even bother with privileged ports? It just makes you run
something like a DNS server at higher privs that it really should
need.

A sysctl or even a kernel option to turn off privileged ports would be
neat (and I was for some reason under the impression there was one
until I actually tried to find one the other day), but I'm afraid the
concept of privileged ports run very deeply in UNIX-type OSes and may
be hard "to just turn off."

Before someone brings it up, yes, privileged ports still do have a
place on isolated clusters of multi-user machines under uniform
administration or where the admins still trust each other. Yes,
allowing unprivileged users to <1024 ports does allow them to do
things like spoof your DNS server should they crack the box and crash
the DNS. But if they crashed it and cracked your box as root, they
could have a lot more.
-- 
Crist J. Clark                           cjclark@alum.mit.edu


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-chat" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010206010943.H91447>