Retaining file permissions

Dan Bernstein brnstnd at kramden.acf.nyu.edu
Sat Mar 2 12:22:43 AEST 1991


Rather than thinking about security holes, think about user mistakes. If
the kernel turns off the setuid bit upon write, it is much less likely
for a setuid program to be accidentally corrupted than it would be
otherwise. End of discussion.

(User mistakes aren't always the end of the story; sometimes you have to
consider denial-of-service attacks before you see why something reduces
security. But this case is relatively simple.)

---Dan



More information about the Comp.unix.shell mailing list