Download now Free registration required
Dropping unneeded process privileges promotes security, but is notoriously error-prone due to confusing set id system calls with unclear semantics and subtle portability issues. To make things worse, existing recipes to accomplish the task are lacking, related manuals can be misleading, and the associated kernel subsystem might contain bugs. The authors therefore proclaim the system as untrustworthy when it comes to the subject matter, and suggest a defensive easy-to-use solution that addresses all concerns. Whenever one run a program, it assumes their identity and one lend it all their power: whatever one allowed to do, it too is allowed. This includes deleting files, killing other programs, changing password, retrieving mail, etc.
- Format: PDF
- Size: 77.3 KB