Subject: Re: Installing local packages and NetBSD guide
To: Magnus Eriksson <magetoo@fastmail.fm>
From: Steven M. Bellovin <smb@cs.columbia.edu>
List: netbsd-users
Date: 09/29/2007 04:21:16
On Fri, 28 Sep 2007 20:05:52 +0200 (CEST)
Magnus Eriksson <magetoo@fastmail.fm> wrote:

> On Fri, 28 Sep 2007, John Nemeth wrote:
> 
> > }    Having a suid root program exploited to create the directory,
> > or change } the permissions of it -- *that* security problem.
> 
> >     If an suid root program can be exploited in such a way, it can
> > most likely cause all sorts of other problems.
> 
>    Maybe such a buggy program could, maybe not.  But are you then
> saying that this particular hole should therefore *not* be fixed?
> 
>    Seems kinda obvious to me that when you see a potential security 
> problem, you fix it right away, no matter how unlikely it seems it
> might be exploited.  That just the way you do things.
> 
I do not agree that it's a hole.  I think it's correct to
include /usr/local in default paths -- /usr/local/bin for
execution, /usr/local/lib for linking, /usr/local/include for
compiling, etc.  I regard it as necessary for running production
systems where I want to be able to do "vendor" upgrades without
interfering with locally-developed or installed code.
> 
> > This is a pretty trivial concern.
> 
> > }    I don't know exactly in which "various default
> > PATHs" /usr/local is
> >
> >    The ones in /etc/skel/*, which are the files used to populate a
> > user's home directory when you do 'useradd -m ...'.  Also, the ones
> > in /root/.*.
> 
>    So in the default PATH for all users?  Including root?  Wow.
> 
If you do 'useradd -m root', yes.  Given that root already exists --
with a .profile, etc., that doesn't come from there -- I'd call that a
non-issue. 



		--Steve Bellovin, http://www.cs.columbia.edu/~smb