RE: allowing ordinary users to open privileged ports
From: Myers, Mike (Mike.Myers_at_nwdc.net)
Date: Tue, 14 Sep 2004 10:41:52 -0700 To: "Brian Parent" <email@example.com>, firstname.lastname@example.org
You know, I've often heard this statement (about SUID shell scripts being dangerous) without a good explanation -- too often the authoring citing "security concerns" for not explaining it (not that Brian did!)
For those who feel the same way, I found a reasonable explanation here:
It does a good job of covering PATH issues, timing issues and others. Always good to understand exactly what type of attack one is defending against.
- Mike Myers, Mike.Myers <at> nwdc.net
From: Brian Parent [mailto:email@example.com]
Sent: Monday, September 13, 2004 10:29 AM
Subject: Re: allowing ordinary users to open privileged ports
I'm glad to hear that your method #2 presented other problems
which prevented you from using it.
Creating a setuid shell script creates a major security hole.
Local users with access to such a script can execute arbitrary
programs as the owner of the script (root in this case).