svn commit: r228843 - head/contrib/telnet/libtelnet
head/crypto/heimdal/appl/telnet/libtelnet head/include head/lib/libc/gen
head/lib/libc/iconv head/lib/libc/include head/lib/libc/net head/libexec...
Andrey Chernov
ache at FreeBSD.ORG
Sun Jan 15 02:15:12 UTC 2012
On Sat, Dec 24, 2011 at 02:26:20AM -0800, Xin LI wrote:
> chroot(2) can create legitimate and secure environment where dlopen(2)
> is safe and necessary.
It seems it is internal contradiction in your argumentation:
1) You state that chroot(2) can create legitimate environment.
2) For ftpd's you disable .so loading in any case, i.e. even for
legitimate environment too and you want to do so intentionally refusing
passing responsibility to chroot(2) environment creator.
In that situation the only suggestion of something like public interface
is setting enviroment variable like "LD_SO_DISABLE" which prevents .so
loading in libc.
This is more clear than your stopgap.
And please don't say that enviroment variable can be overwritten by the
user inside ftpd itself, it is not so. And for case when some ftpd allows
to call _any_ external program, it could do anything, like with your
stopgap too.
--
http://ache.vniz.net/
More information about the svn-src-head
mailing list