home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.os.linux
- Path: sparky!uunet!mcsun!sun4nl!fwi.uva.nl!gene.fwi.uva.nl!vesseur
- From: vesseur@fwi.uva.nl (Joep JJ Vesseur)
- Subject: Re: clearing SUID bit on writes
- Message-ID: <1992Sep1.235018.14835@fwi.uva.nl>
- Sender: news@fwi.uva.nl
- Nntp-Posting-Host: gene.fwi.uva.nl
- Organization: FWI, University of Amsterdam
- References: <1992Sep1.170221.17317@athena.mit.edu> <kecw=5m00VogI1C1Jm@andrew.cmu.edu>
- Date: Tue, 1 Sep 1992 23:50:18 GMT
- Lines: 20
-
- Frank T Lofaro <fl0p+@andrew.cmu.edu> writes:
-
- > Linux should definitely un-setuid and un-setgid files on any
- >modification (such as an append). Otherwise it could prove to be a very
- >nasty security hole.
- >[...] doesn't belong in a secure (well,
- >as secure as UN*X can reasonably be) environment.
-
- well, i don't know to what extend linux _is_ secure (anyone out there
- cares to make any correctness proofs?) and whether anyone uses it
- as a real multiple user (read: different users) system at the moment,
- but no doubt this will happen in the future.
- i only don't think it should clean the bit on all modifications, only
- those initiated by users with a different real-uid than the owner of
- the file, in contrast to sysV.
-
- joep.
-
- ---
- joep vesseur --- email: vesseur@fwi.uva.nl
-