should Unix refuse to execute writable binaries?
Barry Shein
bzs at world.std.com
Mon Mar 4 15:31:05 AEST 1991
Any writeable, public executable is a hazard, most users consider
their own files valuable and such executables are a hazard to them as
they run with their own privs. It's somewhat admin-o-centric to think
there's something special about setuid/setgid, just a different form
of damage possible (and system disruption is fairly possible from even
non-priv'd accounts, for example a hacked program which fills /tmp.)
The only idea that comes to mind would be something analogous to the
umask() indicating which bits can and cannot be set on an executable,
tho I suspect some thought will reveal that the problem is more subtle
than that, but something like xmask(022) might help.
--
-Barry Shein
Software Tool & Die | bzs at world.std.com | uunet!world!bzs
Purveyors to the Trade | Voice: 617-739-0202 | Login: 617-739-WRLD
More information about the Comp.unix.wizards
mailing list