however, if one of the zebra daemons itself can re-obtain root or
elevated capabilities, an exploit can also do so.
yes.
therefore, running as non-root normally but not dropping the "right
to become root" will add an additional layer of protection, but it
will not completely prevent remote root exploits.
absolutely.
the linux capabilities stuff is the most secure - as it retains the
fewest privileges for an attacker to try regain.
the other platforms, well an exploit can indeed raise privileges to
root again.
though, it does make it slightly more difficult for an exploit to
raise privileges and actually still exploit the code further though.
on systems with non-executable stacks exploiting zebra while raising
privileges and actually doing something else becomes yet more
difficult.
NB: there is a possibility that there are exploits in the wild for
zebra. (no idea whether it is true, and if so, which versions and
whether it applies to quagga too).
- ruud
regards,
--
Paul Jakma ***@clubi.ie ***@jakma.org Key ID: 64A2FF6A
warning: do not ever send email to ***@dishone.st
Fortune:
No directory.