Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Jul 1999 10:52:34 -0600
From:      Nate Williams <nate@mt.sri.com>
To:        Dominic Mitchell <Dom.Mitchell@palmerharvey.co.uk>
Cc:        jkoshy@FreeBSD.ORG, chris@calldei.com, hackers@FreeBSD.ORG
Subject:   Re: yet more ways to attack executing binaries (was Re: deny ktrace without read permissions? )
Message-ID:  <199907261652.KAA19121@mt.sri.com>
In-Reply-To: <19990726132132.B78403@voodoo.pandhm.co.uk>
References:  <19990726054037.D79022@holly.dyndns.org> <199907261116.EAA43920@freefall.freebsd.org> <19990726132132.B78403@voodoo.pandhm.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
> > LD_LIBRARY_PATH, LD_PRELOAD and LD_DEBUG are ignored for setuid executables
> > in FreeBSD.
> 
> But the point being made is that they are not ignored for executables
> which have no read access.  And from there, read access can be gained,
> because at that point, you have code running in the process's address
> space.

That's right.  In other words, there really is no way of protecting
executable files from being read if someone is motivated enough.

And, in an open-source OS like FreeBSD, it's not a viable solution in
any case....



Nate


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199907261652.KAA19121>