Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 25 Jul 1999 22:48:52 -0700 (PDT)
From:      Sean Eric Fagan <sef@kithrup.com>
To:        jkoshy@freebsd.org
Cc:        hackers@freebsd.org
Subject:   Re: deny ktrace without read permissions?
Message-ID:  <199907260548.WAA10899@kithrup.com>
In-Reply-To: <199907260544.WAA13646@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
>Yes, but an application can protect itself from an inadvertent core dump.
>It can't (today) against being ktrace'd.

You'd better fix ptrace and procfs then.  Of course, that breaks everything
that has always been true, but, hey, it's better to be wrong than right, I
guess?

if you care about security, you made the damned executable suid or sgid.  Then
ktrace, ptrace, truss, and core dumps do not work.  Even if it simply does
setuid(getruid()).



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199907260548.WAA10899>