Assignment 6, due Mar 30
Part of
the homework for 22C:169, Spring 2006
|
Always, on every assignment, please write your name legibly as it appears on your University ID and on the class list! All assignments will be due at the start of class on the day indicated, and unless there is what insurance companies call "an act of God" - something outside your control; the only exceptions to this rule will be by advance arrangement.
As it turns out, the anon command as designed here has a significant security loophole. A program launched by the anon command can potentially attack the anon command itself.
a) What damage can the attack program do?
b) Design the attack program. That is, how does the attack program go about its business of attacking the anon command.
c) Explain how the Unix chroot command can be used to create an even deeper sandbox that will defend against this attack.
d) Can you devise a defense that does not involve the use of chroot but instead rests entirely on the tools used to produce the original anon command discussed in the notes?
Outline, at the top level, what you would look for in assessing the security of .NET or Java against such attacks.