I just read the fam FAQ, and noticed the following:
| Is fam secure?
|
| fam has long had a known security weakness which allows clients to
| learn the names of files and directories on the system. This version
| of fam does not have that problem. Connections from local clients
| are treated as untrusted unless the client is able to communicate
| over a unix domain socket readable only by the client's claimed
| UID.
So far so good.... but then:
| Connections from remote clients are treated as untrusted unless
| they originate from a privileged port, and requests are only
| serviced if they fall on filesystems which have been exported to the
| requesting host.
If I'm interpreting this correctly, anybody on the net that has root
on their computer will be treated as trusted by fam on my computer.
Remote connections should ALWAYS be treated as untrusted.
If I'm misinterpreting, could you please clarify the FAQ?
Also, it would be nice to get away from RPC services, since they are
so difficult to block from the outside world. At the very least,
services (such as fam) that are intended for local use should only
listen on the loopback interface.
--
Rob Funk <rfunk@xxxxxxxxxxxxxxxxxxxxxx>
The Ohio State University
University Technology Services / Workstation Support
http://wks.uts.ohio-state.edu/
--
To unsubscribe: echo unsubscribe fam | mail majordomo@xxxxxxxxxxx
|