[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Help-gss Digest, Vol 6, Issue 1

From: Galchin Vasili
Subject: Re: Help-gss Digest, Vol 6, Issue 1
Date: Wed, 25 Oct 2006 12:27:45 -0500

Hello Simon,
     I know that there are discussions in the Unix or POSIX community about retiring root and go to something with finer granularity as in the SELinux approach. In this vein, one idea I have been thinking about is for InitSecurityContext and AcceptSecurityContext calls reject these requests if the process is running with root's uuid.
Regards, Vasili

Message: 2
Date: Wed, 25 Oct 2006 12:54:30 +0200
From: Simon Josefsson < address@hidden>
Subject: Re: security hole in GSS when running as root?
To: "Galchin Vasili" <address@hidden>
Cc: address@hidden
Message-ID: <address@hidden>
Content-Type: text/plain; charset=us-ascii

"Galchin Vasili" < address@hidden> writes:

> Hello,
>     If some GSS security mecahisms store information, like e.g.
> credentials, in files, running as root a process can read these files and
> then masquerade as others.

Right.  The Unix design has been to give "root" the ability to do
anything on a system, including reading user's private credentials.

There are few technical options that solve this completely, as far as
I'm aware.

Do you consider this an important problem?  If you have suggestions on
solving it, I'd be happy to discuss them.



Help-gss mailing list

End of Help-gss Digest, Vol 6, Issue 1

reply via email to

[Prev in Thread] Current Thread [Next in Thread]