[Openswan dev] user control of conns

mcr at xelerance.com mcr at xelerance.com
Wed Dec 8 10:28:23 CET 2004


-----BEGIN PGP SIGNED MESSAGE-----


>>>>> "Ludwig" == Ludwig Nussel <ludwig.nussel at suse.de> writes:
    >> It was my intention to make this program setuid root, such that
    >> it could talk to the whack socket.
    >> 
    >> On the other hand, making the whack socket have group permissions
    >> permits the executable either to be setgid() instead, or for the
    >> user to actually be a member of a "pluto" (or "ipsec" ??) group.
    >> 
    >> What do you think?

    Ludwig> Use neither setuid nor setgid, make the socket accessible by
    Ludwig> everyone instead. It's a unix domain socket so pluto can
    Ludwig> check who is connecting and reject unauthorized users. The
    Ludwig> messages coming from non-root users cannot be trusted then
    Ludwig> though.

  That's a good suggestion.

  Do you think that the socket should have a specific group as well,
just to make it more clear what is going on?

- -- 
]       ON HUMILITY: to err is human. To moo, bovine.           |  firewalls  [
]   Michael Richardson,    Xelerance Corporation, Ottawa, ON    |net architect[
] mcr at xelerance.com      http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys

iQCVAwUBQbc5sIqHRg3pndX9AQGP+AQAnckdtSghtP/oL6Yoru0pmazX9XidyCl2
x32C6yLdGjGiqTgCXjqTJAnGw5rxgQ3TJLWnIccespROcSYHgmdrB9VOyU5MqfW9
YtTcnxlMiDD4MabmIZmlS78z7SRhbf2MxGJsGXxZLZEXn3QwXwIvmVr0BijKYupP
Ie92pPZkEfk=
=2rfg
-----END PGP SIGNATURE-----


More information about the Dev mailing list