Protecting against downloads
Karl Denninger
karl at naitc.naitc.com
Tue Sep 25 01:40:41 AEST 1990
In article <1990Sep23.061854.309 at csense.uucp> bote at csense.uucp (John Boteler) writes:
>Posting for the benefit of the trustee:
>
>>Message-Id: <9009222103.AA06890 at scicom.alphacdc.com>
>>Date: 22 Sep 90 21:03:45 MDT (Sat)
>>From: uunet!scicom.alphacdc.com!rick (Richard E. Oakes)
>>Status: RO
>
>I came into this discussion a little late, but so far I have seen no
>discussion of the oldest, but still effective way of controlling what users
>do once they get to the shell: the use of /bin/rsh. rsh does not let the user
>cd to other directories, or execute commands with a path in the command (paths
>ARE allowed in the arguments), so you can controll exactly which commands they
>can execute. To implement this properly, you do need to remember a few things:
>
> The .profile of the user must be owned by root, and writeable ONLY by
> root.
> The .profile must define a PATH that includes a directory such as
> /rbin, and does NOT include /bin or /usr/bin.
> The .profile must define and export SHELL=/usr/rbin. This will ensure
> that any shell called from vi or other programs are also rsh.
NO! This isn't going to work.
Look at ":set shell" again in vi. Try it in this environment. I can get
out of any environment that is controlled by "rsh" using this.
Vi has a couple of "wonderful" features in it that don't lend themselves to
security. ":set shell" is the worst offender of all; for the user who knows
how it's a way to get to >any< executable for which the user has execute
permission. Yes, I did say "any", and I'll stand by it.
To AT&T's credit, they don't claim that "rsh" is completely secure. In
fact, if vi (or ex) is on the system, you may as well not bother with
"restricted" shell users.
--
Karl Denninger AC Nielsen
kdenning at ksun.naitc.com
(708) 317-3285
Disclaimer: Contents represent opinions of the author; I do not speak for
AC Nielsen on Usenet.
More information about the Comp.unix.sysv386
mailing list