Re: Solaris Signals

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Actually, many systems (current versions of solaris included) disallow
user ptrace(2) and restrict /proc access for processes whose binaries
are not readable.  If you compile the binary statically (due to its
sensitive nature), you needn't worry about trickery with dynamic library
instructions.

Note that i only bring this up to further the information; i do not
condone the act of putting sensitive information into a binary that
executes without modified privileges (or, indeed, putting sensitive
information into an executable at all).

ari

--
[http://www.episec.com/people/edelkind/]


fvw@var.cx said this stuff:

[...]
> Making programs execute-only is no security for such things unless you
> add a lot of weird-and-definately-not-wonderful special cases all over
> the OS. Even if you stop programs from dumping core if
> access(executable, R_OK), you can still do LD_PRELOAD/LD_LIBRARY tricks
> and get access to the process' memory (or just log all library or system
> calls which gets you all the interesting stuff too, usually), and with
> a little creativity there's plenty of other ways to get around lack of
> read rights. 
> 
> -- 
> Frank v Waveren                                      Fingerprint: 21A7 C7F3
> fvw@[var.cx|stack.nl|chello.nl] ICQ#10074100            1FF3 47FF 545C CB53
> Public key: hkp://wwwkeys.pgp.net/fvw@var.cx            7BD9 09C0 3AC1 6DF2

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux