Test for root.

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Thomas Mondoshawan Tate
Date:  
Subject: Test for root.
--s9fJI615cBHmzTOP
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Fri, Sep 07, 2001 at 08:11:07AM -0700, Matt Alexander wrote:
> On Fri, 7 Sep 2001, David A. Sinck wrote:
>=20
> >
> >
> > \_ SMTP quoth Matt Alexander on 9/6/2001 17:35 as having spake thusly:
> > \_
> > \_ On Thu, 6 Sep 2001, Matt Alexander wrote:
> > \_
> > \_ P.S. You should also get in the habit of specifying the full path t=

o any
> > \_ programs you use in your shell scripts. So in the above test, use
> > \_ /usr/bin/whoami instead of just whoami.
> >
> > I haven't tried this in a malicious setting, but I bet chroot could
> > foil that too.
>=20
> On most Unix systems, only root can use the chroot command.
> ~M


I was wondering about that... I've built whole distros from scratch, and
I've noticed that if joe blow user has access to the chroot command, he
could (theoreticially) root the system by creating a minidistro in his home
directory. I've yet to test my theory, though. I'll bet there's a safeguard
in there somewhere to prevent this.

--=20
Thomas "Mondoshawan" Tate

http://tank.dyndns.org

--s9fJI615cBHmzTOP
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7mOhVYp5mUsPGjjwRAuteAKCWOEZ1doAaRLoo2sYcAb+vslpYGgCfcE5P
+Ud74YbEt12d59+kPtwUoq0=
=okjr
-----END PGP SIGNATURE-----

--s9fJI615cBHmzTOP--