<snip>
> > and something just hit me:  Somewhere in those documents they were
> > talking about looking for files that had the suid bit set and that
were
> > owned by root.
> >
> > Now, I usually put my source files in /usr/local/src, so that I have
one
> > place to put them.  And I su to root before I do so, because my
normal
> > account doesn't have access to that folder.  Which means that I'm
> > compiling my sources as root, then installing them.
> >
> > Is this a bad security hole?  Do I need to somehow set up a
'compile'
>
> Not usually - but its always good to make sure that no executable
> binaries have been suid to root unless you are certain they are
supposed
> to be.
>
>
> to find suid files use the find command:
>
> find /<dir> -perm -4000 -print

Okay, thanks!  Next question:  I ran that find command from the root
directory, and found thirty executables with that suid bit set.  Some I
can tell need it (sudo, suexec), some I think I can just delete (rlogin,
rsh, rcp), but there are some that I don't know why they have suid
(userisdnctl, etc).  Is there a place that has a recognized list of
files that *should* be suid?  Or do I need to check each man page for
each file that has that bit set?

Thanks again!  I am learning the security side of this, but every time I
think I have a handle on things, I find out that there's a *lot* more to
learn! :)

Ben


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to