Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-06 Thread David Brodbeck
On Dec 5, 2007, at 6:20 PM, Douglas A. Tutty wrote: I don't know if OpenBSD has any other tricks under the hood to protect the system from a milicious but legitimate shell user. They might have a few, I don't know. It's worth noting that their brag line on their website only refers to *rem

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Douglas A. Tutty
On Wed, Dec 05, 2007 at 04:58:59PM +0100, Martin Marcher wrote: > On 12/4/07, andy <[EMAIL PROTECTED]> wrote: > > ls -l /sbin is all > > > > -rwxr-xr-x 1 root root ... > > I understand this issue. What I don't get is why it seems to be the > overall default that others may read and execute files

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread David Brodbeck
On Dec 5, 2007, at 9:57 AM, Martin Marcher wrote: But since *nix has a history of being secure because a user/process can't by default destroy any data besides the data one/it owns. Why not take that one further and require explicit permission to even run a program that can potentially destroy d

Re: permissions in general

2007-12-05 Thread John Hasler
Martin Marcher wrote: > Why not take that one further and require explicit permission to even run > a program that can potentially destroy data? There are few useful programs without the potential to destroy data. > Why not take that one further and require explicit permission to run > _any_ prog

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Joey Hess
Martin Marcher wrote: > /usr/bin/perl > /usr/bin/wget > /bin/tar How about /bin/cat, which can be used to transfer copies of any of these onto the system? > * Why not take that one further and require explicit permission to run > _any_ program? Because then you have a web server with some CGIs.

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Martin Marcher
On 12/5/07, Joey Hess <[EMAIL PROTECTED]> wrote: > Martin Marcher wrote: > > So the user needs to get a precompiled gcc somewhere. > > Then she would need to get all the header files necessary > > Then she needs to get the source. > > Then the quota is full... :) > > Most systems come with perl. Pe

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Joey Hess
Martin Marcher wrote: > So the user needs to get a precompiled gcc somewhere. > Then she would need to get all the header files necessary > Then she needs to get the source. > Then the quota is full... :) Most systems come with perl. Perl can do anything any non-suid program in /sbin can do. Most

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Martin Marcher
On 12/5/07, Mike Bird <[EMAIL PROTECTED]> wrote: > > I guess it's more a historical reason that others can r+x most of the > > system but I can see a lot of benefits in denying others by default > > (of course there's a lot of work involved to migrate from the current > > permission schema that's a

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Martin Marcher
Hi, On 12/5/07, Nyizsnyik Ferenc <[EMAIL PROTECTED]> wrote: > On Wed, 5 Dec 2007 16:58:59 +0100 > "Martin Marcher" <[EMAIL PROTECTED]> wrote: > > /bin root:users rwxr-x--- > > /sbin root:adm rwxr-x--- > > /usr/bin root:users rwxr-x--- > > /usr/sbin root:adm rwxr-x--- > > I do get your idea, but ha

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Mike Bird
On Wednesday 05 December 2007 07:58:59 Martin Marcher wrote: > On 12/4/07, andy <[EMAIL PROTECTED]> wrote: > > ls -l /sbin is all > > > > -rwxr-xr-x 1 root root ... > > I understand this issue. What I don't get is why it seems to be the > overall default that others may read and execute files in

Re: permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Nyizsnyik Ferenc
On Wed, 5 Dec 2007 16:58:59 +0100 "Martin Marcher" <[EMAIL PROTECTED]> wrote: > Hi, > > jumping in. > > On 12/4/07, andy <[EMAIL PROTECTED]> wrote: > > ls -l /sbin is all > > > > -rwxr-xr-x 1 root root ... > > I understand this issue. What I don't get is why it seems to be the > overall defau

permissions in general (WAS: Re: permissions in /sbin)

2007-12-05 Thread Martin Marcher
Hi, jumping in. On 12/4/07, andy <[EMAIL PROTECTED]> wrote: > ls -l /sbin is all > > -rwxr-xr-x 1 root root ... I understand this issue. What I don't get is why it seems to be the overall default that others may read and execute files in most cases. To me it would make sense to have something