[future patch] dropping user privileges on demand

Kris Kennaway kris at obsecurity.org
Thu Aug 21 00:39:02 PDT 2003


On Thu, Aug 21, 2003 at 01:58:54AM -0500, Dan Nelson wrote:

> It does something similar, but uses a C-like language to control a
> processes actions.  This lets you get extremely fine-grained control
> (allow httpd to bind to only port 80, once), but the rules run as
> "root", so they can grant as well as revoke privileges.  A useful
> modification would be to allow users to submit their own policies that
> can only disallow actions (i.e. all arguments and process variables are
> read-only, and the script can either pass the syscall through or return
> a failure code, nothing else).

Exercise for the reader: find a situation where the failure to perform
a syscall that normally succeeds, leads to privilege escalation :-)

Kris
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-hackers/attachments/20030821/42d4a34a/attachment.bin


More information about the freebsd-hackers mailing list