Subject: Re: replacement for /etc/passwd
To: None <tech-security@netbsd.org>
From: Alan Post <apost@interwoven.com>
List: tech-security
Date: 12/10/2002 08:01:09
In article <20021210043231.A4B537B6B@berkshire.research.att.com>, Steven M. Bellovin wrote:
> In message <slrnavap6e.ip.apost@water.amer.interwoven.com>, Alan Post writes:
>>
>>  drwxr-xr-x  root:wheel   /etc/userdb
>>  dr-xr-xr-x  root:wheel   /etc/userdb/apost
>>  -r--r--r--  root:wheel   /etc/userdb/apost/uid
>>  -r--r--r--  root:wheel   /etc/userdb/apost/gid
>>  -rw-------  apost:users  /etc/userdb/apost/passwd_hash
>>  -rw-r--r--  apost:users  /etc/userdb/apost/office
>>  -rw-r--r--  apost:users  /etc/userdb/apost/homedir
>>  -rw-r--r--  apost:users  /etc/userdb/apost/shell
>>  dr-xr-xr-x  root:wheel   /etc/userdb/otheruser
>>
>>The only disadvantage that I can come up with is that if I am able to
>>impersonate a user, I can set her password without knowing the current
>>one.
>>
>>Am I missing something basic?
> 
> Yes -- the changes you're permitting are root-equivalent, which means 
> that only root should be able to do them.  For example, if I can change 
> your home directory, I change what .profile you use, which means I 
> could run any commands as you.

If you can write to /etc/userdb/apost/homedir, then you must have
access to my files already, so how is this a new problem?

> Similarly, I could change your hashed password to one I know the
> plaintext for, which means that again, I'd have access to all your
> files.

I mentioned that one -- it is easier to set the password, no
trojan-user-delay involved.


  Alan