Subject: Re: bin/35479: /usr/sbin/timedc fails
To: None <gnats-admin@netbsd.org, netbsd-bugs@netbsd.org, djv@bedford.net>
From: Christos Zoulas <christos@zoulas.com>
List: netbsd-bugs
Date: 01/25/2007 22:30:02
The following reply was made to PR bin/35479; it has been noted by GNATS.

From: christos@zoulas.com (Christos Zoulas)
To: gnats-bugs@NetBSD.org, gnats-admin@netbsd.org,
	netbsd-bugs@netbsd.org, djv@bedford.net
Cc: 
Subject: Re: bin/35479: /usr/sbin/timedc fails
Date: Thu, 25 Jan 2007 17:29:38 -0500

 On Jan 25, 10:10pm, christianbiere@gmx.de (Christian Biere) wrote:
 -- Subject: Re: bin/35479: /usr/sbin/timedc fails
 
 | The following reply was made to PR bin/35479; it has been noted by GNATS.
 | 
 | From: Christian Biere <christianbiere@gmx.de>
 | To: gnats-bugs@NetBSD.org, netbsd-bugs@NetBSD.org
 | Cc: 
 | Subject: Re: bin/35479: /usr/sbin/timedc fails
 | Date: Thu, 25 Jan 2007 23:16:21 +0100
 | 
 |  Woodchuck wrote:
 |  > In other words, the OpenBSD hosts are *rejecting* a connection attempt
 |  > from a privileged socket.  That makes a certain kind of paranoid sense.
 |  
 |  I don't see any such checks in code. Are you sure it's not just the
 |  firewall? Also packets from unprivileged ports are certainly not more
 |  trustworthy than those from privileged ports. If you want to differ at
 |  all than it's rather vice-versa.
 |  
 |  > I notice that timedc is setuid 0 on NetBSD, (obviously, to get that
 |  > privileged socket), but is not setuid on OpenBSD (which uses an unprivileged
 |  > one).
 |  
 |  No, it's not just for this socket but rather for the raw socket.
 |  
 |  > If an unprivileged socket is appropriate, then NetBSD could also
 |  > lose the setuid property, generally a good thing to lose if unnecessary.
 |  
 |  Can you use timedc as non-root on OpenBSD at all? I would think there's no
 |  need to but I doubt not dropping privileges at all is better.
 
 Plus you don't want random people forcing elections or even bogging down
 the time server.
 
 christos