[Openswan dev] user control of conns
mcr at xelerance.com
mcr at xelerance.com
Wed Dec 8 10:28:23 CET 2004
-----BEGIN PGP SIGNED MESSAGE-----
>>>>> "Ludwig" == Ludwig Nussel <ludwig.nussel at suse.de> writes:
>> It was my intention to make this program setuid root, such that
>> it could talk to the whack socket.
>>
>> On the other hand, making the whack socket have group permissions
>> permits the executable either to be setgid() instead, or for the
>> user to actually be a member of a "pluto" (or "ipsec" ??) group.
>>
>> What do you think?
Ludwig> Use neither setuid nor setgid, make the socket accessible by
Ludwig> everyone instead. It's a unix domain socket so pluto can
Ludwig> check who is connecting and reject unauthorized users. The
Ludwig> messages coming from non-root users cannot be trusted then
Ludwig> though.
That's a good suggestion.
Do you think that the socket should have a specific group as well,
just to make it more clear what is going on?
- --
] ON HUMILITY: to err is human. To moo, bovine. | firewalls [
] Michael Richardson, Xelerance Corporation, Ottawa, ON |net architect[
] mcr at xelerance.com http://www.sandelman.ottawa.on.ca/mcr/ |device driver[
] panic("Just another Debian GNU/Linux using, kernel hacking, security guy"); [
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
Comment: Finger me for keys
iQCVAwUBQbc5sIqHRg3pndX9AQGP+AQAnckdtSghtP/oL6Yoru0pmazX9XidyCl2
x32C6yLdGjGiqTgCXjqTJAnGw5rxgQ3TJLWnIccespROcSYHgmdrB9VOyU5MqfW9
YtTcnxlMiDD4MabmIZmlS78z7SRhbf2MxGJsGXxZLZEXn3QwXwIvmVr0BijKYupP
Ie92pPZkEfk=
=2rfg
-----END PGP SIGNATURE-----
More information about the Dev
mailing list