Grafpup-2.xx fourth (and final) alpha
Okay, here it is. I'll burn an audio disk tomorrow and see if it works out okay but I would imagine it should after reading thru this web page:
http://scdbackup.sourceforge.net/cdrskin_eng.html
http://scdbackup.sourceforge.net/cdrskin_eng.html
- Attachments
-
- cdrskin-0.3.5.pet
- (152.84 KiB) Downloaded 249 times
That'll be me then...!I checked my kernel config and found a couple errors relating to sata, so I'm going to be recompiling the kernel again. I'll of course be needing testers with sata hardware.
I'll keep a close eye out here and on grafpup.org, and when I see a testing or other iso, I'll get straight on it.
Sounds good. I just burned an audio disc with grafburn as grafpup and it seemed to burn fine. I went to rip a track with pbcdripper and noticed that the resulting track was owned by root. I didn't encode but just ripped to wav. I would think if I tried to encode to something I wouldn't be able to since root owns the file. Therefore there's still an issue with root owning the device.
If you want to try wodim instead it is set up the same way with cdrecord as a symlink to wodim. It depends on libcap which I'll also post. I forgot to strip that library initially but have done so now and it is only 9.969 kilobytes.
wodim is part of cdrkit which is debian's fork of cdrtools.
wodim is part of cdrkit which is debian's fork of cdrtools.
- Attachments
-
- wodim-1.1.2.pet
- (164.59 KiB) Downloaded 242 times
-
- libcap-1.92.pet
- (4.53 KiB) Downloaded 247 times
It might be best to keep cdrecord and rename it to something else or use wodim for the blanking of discs and everything else can be passed to cdrskin. Something like this:
Code: Select all
#!/bin/bash
#save as /usr/bin/cdrecord
if [ "`echo "$@" | grep blank`" != "" ]; then
wodim "$@"
else
cdrskin "$@"
fi
exit 0
Well this may all be avoided. Did you read the page at:
http://scdbackup.sourceforge.net/cdrskin_eng.html
They have examples of blanking posted using cdrskin. Did you try it or just notice it wasn't in the help display? I'm going to give it a try soon.
http://scdbackup.sourceforge.net/cdrskin_eng.html
They have examples of blanking posted using cdrskin. Did you try it or just notice it wasn't in the help display? I'm going to give it a try soon.
- Nathan F
- Posts: 1764
- Joined: Wed 08 Jun 2005, 14:45
- Location: Wadsworth, OH (occasionally home)
- Contact:
Well, when I tried with the binary you posted it shot back that the blank option was not supported. I could try again I suppose, but I'm away from that computer now.
We could also retain cdrecord (or wodim) under a different prefix, say put it in /opt/cdrkit/bin. I'd rather get down to just one "cdrecord" executable, though.
Yet another option would be to do this the Ubuntu way, and allow all users to run cdrecord via sudo. I'd almost rather just install the binary suid root, though. And from my poking around it would seem that the latest versions of cdrecord have been fixed up to make this less of a security issue than before.
There was an incident a while back, in which Jörg Schilling said that the Linux kernel probably had more vulnerabilities than cdrecord installed suid root. He may have been right, but it set off a volly of criticism, and also prompted a few hackers to check out his claim. They found a pretty major vulnerability, where cdrecord did not give up root priveledges and could be exploited to escape to a shell. This is kind of the heart of the controversy right now, but from what I have read he promptly closed that exploit.
So basically, I could probably end all this by compiling the latest cdrtools source and installing it suid root. But I've been a little hesitant to do so, because of all the conflicting information on the net. I'm not one to get all worked up about other hacker's paranoia, really, but the problem is I can't find any definative answer to the question of whether that exploit is really closed.
I'm really going to have to save some of this for later anyway though, as we're getting ready for a trip to see my wife's family over the weekend.
Nathan
We could also retain cdrecord (or wodim) under a different prefix, say put it in /opt/cdrkit/bin. I'd rather get down to just one "cdrecord" executable, though.
Yet another option would be to do this the Ubuntu way, and allow all users to run cdrecord via sudo. I'd almost rather just install the binary suid root, though. And from my poking around it would seem that the latest versions of cdrecord have been fixed up to make this less of a security issue than before.
There was an incident a while back, in which Jörg Schilling said that the Linux kernel probably had more vulnerabilities than cdrecord installed suid root. He may have been right, but it set off a volly of criticism, and also prompted a few hackers to check out his claim. They found a pretty major vulnerability, where cdrecord did not give up root priveledges and could be exploited to escape to a shell. This is kind of the heart of the controversy right now, but from what I have read he promptly closed that exploit.
So basically, I could probably end all this by compiling the latest cdrtools source and installing it suid root. But I've been a little hesitant to do so, because of all the conflicting information on the net. I'm not one to get all worked up about other hacker's paranoia, really, but the problem is I can't find any definative answer to the question of whether that exploit is really closed.
I'm really going to have to save some of this for later anyway though, as we're getting ready for a trip to see my wife's family over the weekend.
Nathan
Bring on the locusts ...