Don't use /tmp as path for pulsed sockets
Status: Alpha
Brought to you by:
alexmurray
See here for more info:
http://danwalsh.livejournal.com/11467.html
Logged In: NO
The following is a copy of dan's original post:
Daemons "Just say no to using /tmp"
Working on SELinux I get exposed to lots of daemon applications doing evil things. :^(
One of my crusades is to stop daemons from using /tmp. I think the problem here is two-fold,
Many attacks have happened because a careless application writer has written a daemon which writes files to /tmp while running as root.
Just enter "/tmp vulnerabilities" and google responds with 980,000 entries.
System applications creating and writing files/sockets in /tmp, also causes things like pam_namespace to not work well.
Pam_namespace, as I have written about before, can be used to isolate different users on the same system, giving each user his own /tmp. Finally, an issue that is dear to my heart: maintaining proper labeling on all these files being dumped into /tmp is a pain in the butt.
Daemon developers should follow these rules:
I am even hoping to finally get X to stop using /tmp.
Maybe someday Kerberos ...
So if you have a daemon that uses /tmp please consider changing it to use a different directory.
Dan