Retaining file permissions
Dan Bernstein
brnstnd at kramden.acf.nyu.edu
Sat Mar 2 12:22:43 AEST 1991
Rather than thinking about security holes, think about user mistakes. If
the kernel turns off the setuid bit upon write, it is much less likely
for a setuid program to be accidentally corrupted than it would be
otherwise. End of discussion.
(User mistakes aren't always the end of the story; sometimes you have to
consider denial-of-service attacks before you see why something reduces
security. But this case is relatively simple.)
---Dan
More information about the Comp.unix.shell
mailing list