unable to login
Rob Siemborski
rjs3 at andrew.cmu.edu
Thu Jul 8 00:01:52 EDT 2004
On Wed, 7 Jul 2004, Wil Cooley wrote:
> On Wed, 2004-07-07 at 12:45, Mike Beattie wrote:
>
> > And I hate to point out, but then, if a malicious user manages to find a
> > flaw in cyrus they could hypothetically use that flaw to get a copy of
> > /etc/shadow. (If I'm mistaken, *please* correct me)
> >
> > Only the second worst thing after actually getting a root shell, IMO.
>
> Well, I suppose it's possible, but it's better than giving all SASL
> applications read access to /etc/shadow, because there's far less code
> to review and audit in saslauthd than Cyrus IMAP, Postfix, OpenLDAP,
> etc. Not to mention that applications communicate with saslauthd over a
> socket protocol, which one hopes goes to great lengths sanitize input.
Wil nailed it dead on. At some level, *something* is going to have to
read /etc/shadow if that is how you are doing your authentication.
Saslauthd limits the amount of code that needs to access that file (and
thus the amount of code to verify).
-Rob
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Rob Siemborski * Andrew Systems Group * Cyert Hall 207 * 412-268-7456
Research Systems Programmer * /usr/contributed Gatekeeper
---
Cyrus Home Page: http://asg.web.cmu.edu/cyrus
Cyrus Wiki/FAQ: http://cyruswiki.andrew.cmu.edu
List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list.html
More information about the Info-cyrus
mailing list