[4527] in bugtraq

home help back first fref pref prev next nref lref last post

Re: UNIX domain socket (Solarisx86 2.5)

daemon@ATHENA.MIT.EDU (Joel Murphy)
Wed May 21 00:54:15 1997

Date: 	Tue, 20 May 1997 14:58:36 -0400
Reply-To: Joel Murphy <jmurphy@CNU.ACSU.BUFFALO.EDU>
From: Joel Murphy <jmurphy@CNU.ACSU.BUFFALO.EDU>
X-To:         shadows@whitefang.com
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.BSF.3.95q.970517113739.8196D-100000@whatever.kuwait.net>
              from "Thamer Al-Herbish" at May 17, 97 11:43:47 am

>
> On Solarisx86 2.5 I was able to connect to a unix domain socket,
> *regardless* of permissions. After posting about it on a solaris usenet
> group the only recommendation anyone gave me was to create it in an
> unreadable directory. So the attacker would have to guess its name.
> Still *anyone* could of connected to that domain socket, and fed my
> application bogus data.

same with sparc.  Solaris uses a loopback device (/dev/ticotsord) and
streams for emulating unix domain sockets.

recently, I've been trying to write some code that would give me the
user id of the person at the other end of a unix socket or tli
connection, but I haven't had much luck.  The only way I think I could
to this would be to poke around in the kernel structures for the tl
device, which I really don't want to do.  The undocumented door calls
seem to provide authentication information, but that would be a worse.
Oh, well.  Anyone have any ideas?

There might even be a way around the directory permissions.  I don't
know if the tl device is looking at the file, or the socket emulation
code in the client is trying to be clever.

Joel Murphy

home help back first fref pref prev next nref lref last post