| Summary: | possible bug in sh(1) with -p flag (privileged mode) | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Base System | Reporter: | alex <alex> | ||||
| Component: | bin | Assignee: | alex <alex> | ||||
| Status: | Closed FIXED | ||||||
| Severity: | Affects Only Me | ||||||
| Priority: | Normal | ||||||
| Version: | 5.0-CURRENT | ||||||
| Hardware: | Any | ||||||
| OS: | Any | ||||||
| Attachments: |
|
||||||
|
Description
alex
2000-07-15 10:00:02 UTC
Responsible Changed From-To: freebsd-bugs->cracauer Martin's our Bourne man. Responsible Changed From-To: cracauer->freebsd-bugs This PR is not really a shell bug, but a matter of security policy (sh has a switch -p that - when set - should allow root to su(8) to a user without inheriting anything from that user's dotfiles that would compromise root's account). Personally, I am not used to think of waterproofed security solutions and I see no reason how I should judge over the measurments such a flag must take to protect the user who su'ed. Looking at bash2, it uses an entirely different (and apparently more though-off) approach towards the same problem. I think this needs to be dicussed on -security. If anyone thinks of an appropriate solution (which includes your suggestion - Alexander), please have it reviewed by security@freebsd.org. I will of course be happy to participiate in such a discussion where I can be of help and would commit and maintain a solution that is considered waterproofed by a substancial group of security-knowledgable people. I would also consider removing this switch as long as it's security gain is questionable. -:---F1 foo (Text Fill)--L1--All--------------------------------- Responsible Changed From-To: freebsd-bugs->alex Assign this PR to me as a reminder to start a discussion on -security about it, as Martin suggested (which will of course end in a bikeshed and result in a IPSEC cabable truncate(1)...). State Changed From-To: open->closed Further investigation tells me, that sh behaves correct. |