[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [MiNT] XaAES / GEM memory issues



> -----Original Message-----
> From:	Konrad M. Kokoszkiewicz [SMTP:draco@obta.uw.edu.pl]
> Sent:	Friday, January 12, 2001 5:47 PM
> To:	MiNT mailing list
> Subject:	RE: [MiNT] XaAES / GEM memory issues
> 
> > Ofcourse not. But I can guarantee that this is a lot safer than not
> having
> > any checks at all. Especially since F_OS_SPECIAL can't be removed for a
> long
> > time yet.
> 
> For now the only change is that the F_OS_SPECIAL will be strictly root
> only.
> 
I run the AES under non-root accounts all the time. Not because I'm afraid
that I will steal from myself, but to protect my setup from personal errors
and mistakes. This will no longer be possible :-(

Btw. does this really help? What if somebody writes a small application with
a userdef that does nasty things? Or does userdefs run in the context of the
calling application already?

> > You could also write a tiny program that occupies all F_OS_SPECIAL
> > privileges, and then kill this immediately before you start the AES.
> > Ofcourse, anyone could then just crash the AES and then exploit
> > F_OS_SPECIAL, but then *you* could use a daemon that constantly monitors
> the
> > status of the AES and immediately spawns your little
> F_OS_SPECIAL-hogging
> > program if it crash etc...
> 
> Sorry, too complex.
> 
Indeed. So will the life of average users be if one focus too much on
theoretical security exploits on the expense of practical safety.

Jo Even Skarstein

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

This email with attachments is solely for the use of the individual or 
entity to whom it is addressed. Please also be aware that 
Vital Insurance/DnB Group cannot accept any payment orders or other 
legally binding correspondance with customers as a part of an email. 

This email message has been virus checked by the virus programs used 
in the Vital Insurance/DnB Group.

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *