Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker
> ...you'd ALSO have to be stupidly running in Root which is not activated in the default install of OS X. Far less than 1/10 of one percent of Mac users have activated a root account. Even fewer will routinely run in root.

1. The malware checks to see if it's running as root, meaning euid=0 (effective uid). This is easily accomplished by any Mac user who set up their own machine, because you don't have to "activate the root account" to do it.

"sudo" is available to all members of group "admin", and the default install user is made a member of group admin so they can administer their own machine. As you know, if you run sudo from the commandline, it requests your password and then runs the command that follows, as root (euid=0). I expect that the well-known installation gui-dialog prompt for password is exactly the same mechanism -- allowing the current user to elevate to root privilege by doing a setuid of 0.

It does NOT require activating the user account called "root".

2. You mean "run as root", not "run in root".

26 posted on 10/01/2009 6:49:44 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 20 | View Replies ]


To: dayglored
2. You mean "run as root", not "run in root".

True.

27 posted on 10/01/2009 10:47:59 PM PDT by Swordmaker (Remember, the proper pronunciation of IE is "AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 26 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson