GNU Queue load-balancing system:What are the Security Issues associated with Queue?:
When Installed by System Administrator

Security is always a concern when granting root privileges to software.

I was security conscious and knowledgeable about UNIX security issues when I wrote queue. It should be paranoid in all the right places, at least provided that the spool directory is root-accessible only (standard installation) or user-accessible (installation by ordinary user) only.

Critical ports allow connections only by hosts in the access control list. Standard checks (TCP/IP wrapper-style) are made to prevent DNS spoofing and IP forwarding as much as possible. In addition, connections must be made from privileged ports (root installation version). queue.c and queued.c run with least-privileges, revoking root privileges as soon as they have verified information and acquired a privileged port.

Moreover, at the time of this writing the source code has been available for a number of months and has been used at numerous installations, including some concerned with security.

However, this does not guarantee that security holes do no exist. It is important that security-conscious users scrutinize the source code and report any potential security problems to bug-queue@gnu.org. By promptly reporting security issues you will be supporting free software by ensuring that the public availability of source code is a security asset.


werner.krebs@yale.edu
Next: When Installed by an Ordinary User
This document is: http://bioinfo.mbb.yale.edu:80/cgi-bin/fom?file=13
[Search] [Appearance] [Show Edit Commands]
This is Faq-O-Matic 2.606.