home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.unix.questions:10513 comp.unix.admin:4769
- Newsgroups: comp.unix.questions,comp.unix.admin
- Path: sparky!uunet!gatech!psuvax1!atlantis.psu.edu!barr
- From: barr@pop.psu.edu (David Barr)
- Subject: NFS security flawed (was: Re: chown : HELP!)
- Message-ID: <4x91H880a9@atlantis.psu.edu>
- Sender: news@atlantis.psu.edu (Usenet)
- Organization: Penn State Population Research Institute
- References: <1992Aug26.081722.27559@leland.Stanford.EDU> <id.2FQS.7B6@ferranti.com> <p6c4vho@rhyolite.wpd.sgi.com>
- Date: Sat, 29 Aug 92 16:25:02 GMT
- Lines: 26
-
- In article <p6c4vho@rhyolite.wpd.sgi.com> vjs@rhyolite.wpd.sgi.com (Vernon Schryver) writes:
- >In article <id.2FQS.7B6@ferranti.com>, peter@ferranti.com (peter da silva) writes:
- >> Yes, you should. But because you're using NFS, you don't. NFS is not a full
- >> UNIX file system.
- >
- >This is political nonsense.
-
- No it's not.
-
- >[stuff everyone knows about root trust deleted]
-
- The NFS concept that you shouldn't by default trust uid=0 has
- a fatal flaw. If a person breaks root on a client machine, all he
- has to do is su to any other user on the system (like bin, adm,
- daemon, or sys) and have root access within minutes anyway. NFS
- will just accpet the remote uid to be the same user as the local uid,
- and you're in. No authentication.
- Unfortunately, there really isn't a better solution out there.
-
- sigh.
-
- --Dave
- --
- System Administrator, Population Research Institute barr@pop.psu.edu
- One is the loneliest number.
- Two is as lonely as one, just shifted to the left.
-