Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

audit use of setuid/setgid to drop privileges #102

Open
grondo opened this issue Jun 28, 2017 · 1 comment
Open

audit use of setuid/setgid to drop privileges #102

grondo opened this issue Jun 28, 2017 · 1 comment

Comments

@grondo
Copy link
Member

grondo commented Jun 28, 2017

pdsh may be installed setuid on systems where the rsh based rcmd module is required in order to bind to reserved ports with rresvport. If pdsh detects it is running setuid (by comparing real and effective uids), it uses privilege separation to create a process just for rresvport and then the main process drops privileges.

The dropping of setuid privileges is a potential source of bugs and should be audited, using this CERT reference and its related papers as a guide:

https://www.securecoding.cert.org/confluence/display/c/POS36-C.+Observe+correct+revocation+order+while+relinquishing+privileges

@garlick
Copy link
Member

garlick commented Jun 28, 2017

I wonder if anyone would care if we just dropped support for rsh?

Maybe these days ssh should be the default connection method?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants