IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Why would you check that UID >= 100 ?
There's a problem with PHP doing this, and it's causing some grief with the default Debian install of Apache 2. This sounds like a "security" measure that depends on everyone else respecting a convention -- like only HTTP traffic on port 80.

Is there any legitimate reason you'd hard-code this test and halt the app if it doesn't pass?
===

Purveyor of Doc Hope's [link|http://DocHope.com|fresh-baked dog biscuits and pet treats].
[link|http://DocHope.com|http://DocHope.com]
New There are reasons, some good some not... some insane.
There are several good reasons. Legacy concerns about buffer overflows and resource hogging and other such factors.

IOW, if you can get the webserver to segfault... you are in with its or maybe even root access.

Most of the concerns are very much overblown, but they are reasonable especially in large hosting setups, or large numbers of shell accounts and other various accounts for people (virtual mail accounts, virtual DNS hosting etc). If you aren't careful you could easily make you machine tippable with nearly zero effort. These are the main reasons for these kinds of decisions.

Others run from "system service uid is forced to <100" for keeping critical accounts not as exploitable, there used to be many many safeguards built into *NIX to protect <100 uid accounts. Unfortuneately they are still practiced, and get in the way many times. But sometimes they save you from yourself. I consider this and reasons similar to be not so good.

The last and most innane reason I know about, is due to PHP being an "interpreted" language, fears of slipping things like we see on twiki (you know misplaced or extra quotes) can break even the most expertly skilled admin. This is more from a lack of maintenance, than a security issue. If you don't take care to manage your systems, or fail to confgure them after install... this is likely to be the reason Debian probably chooses uid of 33. Using 33 causes the reasons in the previous paragraph to come into play... which also then can be turned into the 2 nd previous paragraph.

They are all inter-related, in some way or anther. But you have to remember the olden days when exploits weren't really treated as a threat, but only an annoyance... which led to these practices. Being far from good reasons now.
--
[link|mailto:greg@gregfolkert.net|greg],
[link|http://www.iwethey.org/ed_curry|REMEMBER ED CURRY!] @ iwethey
Freedom is not FREE.
Yeah, but 10s of Trillions of US Dollars?
SELECT * FROM scog WHERE ethics > 0;

0 rows returned.
New UID >= 100 came up today
Odd. One of my coworkers noticed a UID >= 100 test in some piece of FC3 (possible FCn: 1 <= n <= 3), and wondered whether there was some old-school Unix history involved.
New Many reasons, as Greg said
It was assumed that under 100 were admin / service accounts, ie: not real people.
One aspect of that ended up that the useradd command started at 100.
Which in turn meant I got used to my id being 100 on my systems, and was quite annoyed when I ended up being the 2nd person added to certain systems at work.
I ended up swapping IDs with the admins to the NFS would work without setting up maps.
This was local passwd file access of course.
Later Linux useradd started at 500.
New Debian's useradd starts at 1000, now.
"Insert crowbar. Apply force."
     Why would you check that UID >= 100 ? - (drewk) - (4)
         There are reasons, some good some not... some insane. - (folkert)
         UID >= 100 came up today - (dws) - (2)
             Many reasons, as Greg said - (broomberg) - (1)
                 Debian's useradd starts at 1000, now. -NT - (static)

Sorry, what? I wasn't listening. I was fantasizing that I was far away, very alone, and reading a book.
37 ms