Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 3 Sep 1997 01:32:50 +0200 (MET DST)
From:      Eivind Eklund <perhaps@yes.no>
To:        =?KOI8-R?B?4c7E0sXKIP7F0s7P1w==?= <ache@nagual.pp.ru>
Cc:        perhaps@yes.no, current@FreeBSD.ORG
Subject:   Re: games uid->gid does too much damage! Who ever got this idea and why?
Message-ID:  <199709022332.BAA22251@bitbox.follo.net>
In-Reply-To: =?KOI8-R?B?4c7E0sXKIP7F0s7P1w==?='s message of Tue, 2 Sep 1997 18:59:51 %2B0400 (MSD)
References:  <Pine.BSF.3.96.970902171957.8511A-100000@lsd.relcom.eu.net> <Pine.BSF.3.96.970902185053.14401A-100000@lsd.relcom.eu.net>

next in thread | previous in thread | raw e-mail | index | archive | help
> 
> 
> An addition to patches you work now:
> /usr/games/cfscores and /usr/games/snscore should be moved out of DM
> (remove HIDEGAME since they are not a games).
> It assumes that score files itself remains public-readable, of course.
> 
> BTW, better way to be protected is not make binary setuid/gid at all if
> possible, more better then revoke setuid/gid early at startup since
> worms can be found in startup code. Bloating non setuid/gid binary with
> revoke code is not needed and not helps for startup worms in any case.

OK.  Due to the problems with the present patch, I've been thinking of
an alternative, for which I'm awaiting feedback from Theo deRaadt (ways
to break this scheme also requested from all -current readers):

(1) Change dm back to setuid _and_ setgid games.
(2) Set dm schg
(3) Set mode on /usr/games/hide to root.games 550
(4) Change all games to be owned by bin.bin (or preferably root.bin,
    except that is against policy)
(5) Make all hidegames revoke setuid/setgid as soon as possible (which
    I think they already do)

This should (if I'm not missing anything) stop the possibility of
anybody doing overwriting any executables with a games exploit.

Eivind.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199709022332.BAA22251>