* [gentoo-hardened] Systrace resurrection
@ 2006-04-26 6:57 Andrea Barisani
2006-04-26 13:38 ` Joshua Brindle
0 siblings, 1 reply; 12+ messages in thread
From: Andrea Barisani @ 2006-04-26 6:57 UTC (permalink / raw
To: gentoo-security, gentoo-hardened
Hi folks!
I'd like to announce that Systrace is back in the portage tree, it consists
of two packages:
sys-apps/systrace
the userspace application that now features a ptrace backend in case the
kernel patch is not installed.
sys-kernel/systrace-sources
this is standard kernel with our base patchset + systrace patch.
We are trying to get this in hardened-sources as well, as I said you don't
need the kernel patch to try this out, granted that the ptrace backend is
much slower and really useful only for testing/debugging purposes, in the
long run the patch is the way to go.
Testing/feedback is appreciated.
More information here:
http://www.systrace.org
http://www.citi.umich.edu/u/provos/systrace/
Cheers
--
Andrea Barisani <lcars@gentoo.org> .*.
Gentoo Linux Infrastructure Developer V
( )
PGP-Key 0x864C9B9E http://dev.gentoo.org/~lcars/pubkey.asc ( )
0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E ^^_^^
"Pluralitas non est ponenda sine necessitate"
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
2006-04-26 6:57 [gentoo-hardened] Systrace resurrection Andrea Barisani
@ 2006-04-26 13:38 ` Joshua Brindle
2006-04-26 13:44 ` Andrea Barisani
0 siblings, 1 reply; 12+ messages in thread
From: Joshua Brindle @ 2006-04-26 13:38 UTC (permalink / raw
To: gentoo-security, gentoo-hardened
Andrea Barisani wrote:
> Hi folks!
>
> I'd like to announce that Systrace is back in the portage tree, it consists
> of two packages:
>
> sys-apps/systrace
>
>
No, remove it.
> the userspace application that now features a ptrace backend in case the
> kernel patch is not installed.
>
> sys-kernel/systrace-sources
>
> this is standard kernel with our base patchset + systrace patch.
>
> We are trying to get this in hardened-sources as well, as I said you don't
> need the kernel patch to try this out, granted that the ptrace backend is
> much slower and really useful only for testing/debugging purposes, in the
> long run the patch is the way to go.
>
>
Absolutely not.
> Testing/feedback is appreciated.
>
>
Systrace has a broken security model which allows, among other things,
privilege escalation. It is our (hardened) opinion that it is harmful to
security and the cause of hardened. I ask you to remove it. If you don't
we cannot and will not support it, and will discourage its use among our
users.
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
2006-04-26 13:38 ` Joshua Brindle
@ 2006-04-26 13:44 ` Andrea Barisani
2006-04-26 14:01 ` Joshua Brindle
0 siblings, 1 reply; 12+ messages in thread
From: Andrea Barisani @ 2006-04-26 13:44 UTC (permalink / raw
To: gentoo-hardened; +Cc: gentoo-security, Niels Provos
On Wed, Apr 26, 2006 at 09:38:02AM -0400, Joshua Brindle wrote:
> Andrea Barisani wrote:
> >Hi folks!
> >
> >I'd like to announce that Systrace is back in the portage tree, it consists
> >of two packages:
> >
> >sys-apps/systrace
> >
> >
> No, remove it.
> >the userspace application that now features a ptrace backend in case the
> >kernel patch is not installed.
> >
> >sys-kernel/systrace-sources
> >
> >this is standard kernel with our base patchset + systrace patch.
> >
> >We are trying to get this in hardened-sources as well, as I said you don't
> >need the kernel patch to try this out, granted that the ptrace backend is
> >much slower and really useful only for testing/debugging purposes, in the
> >long run the patch is the way to go.
> >
> >
> Absolutely not.
> >Testing/feedback is appreciated.
> >
> >
>
> Systrace has a broken security model which allows, among other things,
> privilege escalation. It is our (hardened) opinion that it is harmful to
> security and the cause of hardened. I ask you to remove it. If you don't
> we cannot and will not support it, and will discourage its use among our
> users.
> --
> gentoo-hardened@gentoo.org mailing list
>
*sigh*
I thought that this flamewar was dead. Ok, I kindly ask a hardened team
review of this since I strongly believe this is not an issue, systrace is
*not* a broken security model and yes it allows *controlled* privilege
escalation if you configure it that way for removing the setuid but on some
binaries.
If you have an argument to make please show me the technical details about it
and let's discuss it.
It's *not* part of hardened atm anyway and it won't be unless the hardened
team accepts it. It will remain in the portage tree as long as I support it
unless you show me a clear demonstration of your concerns.
BTW even with your concern the ptrace method (which can be entirely tested
userspace) is still useful for debugging/testing, hence the userspace package
has no reason for going away.
CC'ing systrace author btw (not subscribed to this list).
--
Andrea Barisani <lcars@gentoo.org> .*.
Gentoo Linux Infrastructure Developer V
( )
PGP-Key 0x864C9B9E http://dev.gentoo.org/~lcars/pubkey.asc ( )
0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E ^^_^^
"Pluralitas non est ponenda sine necessitate"
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
2006-04-26 13:44 ` Andrea Barisani
@ 2006-04-26 14:01 ` Joshua Brindle
2006-04-26 14:14 ` [gentoo-security] " Andrea Barisani
2006-04-26 14:36 ` pageexec
0 siblings, 2 replies; 12+ messages in thread
From: Joshua Brindle @ 2006-04-26 14:01 UTC (permalink / raw
To: gentoo-hardened, gentoo-security, Niels Provos
Andrea Barisani wrote:
> <snip>
>
> *sigh*
>
> I thought that this flamewar was dead. Ok, I kindly ask a hardened team
> review of this since I strongly believe this is not an issue, systrace is
> *not* a broken security model and yes it allows *controlled* privilege
> escalation if you configure it that way for removing the setuid but on some
> binaries.
>
This is no flamewar. The model is broken by my standards. It bypasses
built-in DAC and capabilities in the kernel making it the single attack
vector to gain all access on the system. Compare to grsecurity, rsbac,
selinux which do not bypass kernel access control or escalate privileges.
Further, the "lets ask the user if they want to allow this" is
inherently flawed. It is a discretionary model, the policy is in no way
analyzable. I suggest you read these articles:
http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/
> If you have an argument to make please show me the technical details about it
> and let's discuss it.
>
> It's *not* part of hardened atm anyway and it won't be unless the hardened
> team accepts it. It will remain in the portage tree as long as I support it
> unless you show me a clear demonstration of your concerns.
>
First it will never be accepted by hardened. Second, I believe that
security critical packages (particularly access control systems) should
go through hardened. Random developers *should not* be putting access
control mechanisms in the tree, users will have security expectations
that they cannot meet.
> BTW even with your concern the ptrace method (which can be entirely tested
> userspace) is still useful for debugging/testing, hence the userspace package
> has no reason for going away.
>
As long as its clearly marked as a debugging tool and not as a security
tool.
> CC'ing systrace author btw (not subscribed to this list)
Great.
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-security] Re: [gentoo-hardened] Systrace resurrection
2006-04-26 14:01 ` Joshua Brindle
@ 2006-04-26 14:14 ` Andrea Barisani
2006-04-26 14:36 ` pageexec
1 sibling, 0 replies; 12+ messages in thread
From: Andrea Barisani @ 2006-04-26 14:14 UTC (permalink / raw
To: gentoo-security; +Cc: gentoo-hardened, Niels Provos
On Wed, Apr 26, 2006 at 10:01:54AM -0400, Joshua Brindle wrote:
> This is no flamewar. The model is broken by my standards. It bypasses
> built-in DAC and capabilities in the kernel making it the single attack
> vector to gain all access on the system. Compare to grsecurity, rsbac,
> selinux which do not bypass kernel access control or escalate privileges.
>
> Further, the "lets ask the user if they want to allow this" is
> inherently flawed. It is a discretionary model, the policy is in no way
> analyzable. I suggest you read these articles:
> http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
> http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/
>
Thanks for the links.
It appears we have different standards. I don't find it "broken" at all while
I still see why it's not compatible with yours standards. I can see the
design issue maybe, but that's far from considering it "broken" or a security
issue imho.
This is just a matter of perspective. And anyway one thing are design issues,
one is a real security problem. As it is now sys-apps/systrace and/or
sys-kernel/systrace are not a security issue from a
vulnerability/exploitability POV. So I'm going to keep it there as a
standalone thing, regarding Hardened inclusion we'll discuss this (since I'd
like to hear other hardened team opinions) and if the team doesn't agree then
fine it won't be supported.
> First it will never be accepted by hardened. Second, I believe that
> security critical packages (particularly access control systems) should
> go through hardened. Random developers *should not* be putting access
I completely disagree with this, security critical packages should not go
through hardened by default and anyway there is no policy for that. This case
is an example of why the policy is broken. I want to provide the *choice* of
using/installing systrace, if this doesn't appeal your standards it doesn't necessarily
mean it should be removed from the tree (unless it's a security issue, which is clearly
not).
Btw we are not advertising/documenting this as the perfect security solution,
so let's not make a big fuss about a unstable ebuild. This *random* developer
(member of the Gentoo Security team) would just like to provide a choice to
our users.
Cheers
--
Andrea Barisani <lcars@gentoo.org> .*.
Gentoo Linux Infrastructure Developer V
( )
PGP-Key 0x864C9B9E http://dev.gentoo.org/~lcars/pubkey.asc ( )
0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E ^^_^^
"Pluralitas non est ponenda sine necessitate"
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
2006-04-26 14:01 ` Joshua Brindle
2006-04-26 14:14 ` [gentoo-security] " Andrea Barisani
@ 2006-04-26 14:36 ` pageexec
2006-04-26 14:58 ` Joshua Brindle
1 sibling, 1 reply; 12+ messages in thread
From: pageexec @ 2006-04-26 14:36 UTC (permalink / raw
To: gentoo-hardened, gentoo-security, Niels Provos
On 26 Apr 2006 at 10:01, Joshua Brindle wrote:
> This is no flamewar. The model is broken by my standards. It bypasses
> built-in DAC and capabilities in the kernel making it the single attack
> vector to gain all access on the system. Compare to grsecurity, rsbac,
> selinux which do not bypass kernel access control or escalate privileges.
it'd help the discussion/review (which is what Andrea asked for) if
you/others were more precise and cited specific attacks. generic hand-
waving of 'this is broken' doesn't help it. this is not to say that
i disagree with your opinion (fwiw, you and spender are on the same
side for once ;-).
> http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
> http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/
it's funny that you mention these as i just came across them and was
going to post a rebuttal to many of your claims. do you want them here
on the list or on the blog (it will probably take a few days until i
have enough free time though)?
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
2006-04-26 14:36 ` pageexec
@ 2006-04-26 14:58 ` Joshua Brindle
2006-04-26 15:19 ` Andrea Barisani
0 siblings, 1 reply; 12+ messages in thread
From: Joshua Brindle @ 2006-04-26 14:58 UTC (permalink / raw
To: pageexec; +Cc: gentoo-hardened, gentoo-security, Niels Provos
pageexec@freemail.hu wrote:
> On 26 Apr 2006 at 10:01, Joshua Brindle wrote:
>
>> This is no flamewar. The model is broken by my standards. It bypasses
>> built-in DAC and capabilities in the kernel making it the single attack
>> vector to gain all access on the system. Compare to grsecurity, rsbac,
>> selinux which do not bypass kernel access control or escalate privileges.
>>
>
> it'd help the discussion/review (which is what Andrea asked for) if
> you/others were more precise and cited specific attacks. generic hand-
> waving of 'this is broken' doesn't help it. this is not to say that
> i disagree with your opinion (fwiw, you and spender are on the same
> side for once ;-).
>
>
I don't agree that specific attack vectors are required to determine
whether a model is broken. The reasons I think the model is broken are
pretty clearly laid out in the url's posted. There are also others for
this specific implementation. It is a dire problem to facilitate
non-security aware/minded users to add rules to the policy dynamically.
"If I don't push yes this won't work", these systems have been shown
time and time again to fail. And, like I already said, bypassing
in-kernel DAC and capability restrictions means that there is now a
single attack vector to gain all system privileges. This means systrace
actually *removes* a layer of security from the system, which is clearly
a bad idea.
>> http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
>> http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/
>>
>
> it's funny that you mention these as i just came across them and was
> going to post a rebuttal to many of your claims. do you want them here
> on the list or on the blog (it will probably take a few days until i
> have enough free time though)?
>
On the blog is fine. Remember that those posts aren't targeting specific
implementations (eg., grsec is not affected by all of the issues listed)
but rather the model in general.
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
2006-04-26 14:58 ` Joshua Brindle
@ 2006-04-26 15:19 ` Andrea Barisani
2006-04-26 16:59 ` Joshua Brindle
0 siblings, 1 reply; 12+ messages in thread
From: Andrea Barisani @ 2006-04-26 15:19 UTC (permalink / raw
To: gentoo-hardened; +Cc: pageexec, gentoo-security, Niels Provos
On Wed, Apr 26, 2006 at 10:58:17AM -0400, Joshua Brindle wrote:
> pageexec@freemail.hu wrote:
> >
> >it'd help the discussion/review (which is what Andrea asked for) if
> >you/others were more precise and cited specific attacks. generic hand-
> >waving of 'this is broken' doesn't help it. this is not to say that
> >i disagree with your opinion (fwiw, you and spender are on the same
> >side for once ;-).
> >
> >
thanks :)
> I don't agree that specific attack vectors are required to determine
> whether a model is broken. The reasons I think the model is broken are
> pretty clearly laid out in the url's posted. There are also others for
> this specific implementation. It is a dire problem to facilitate
> non-security aware/minded users to add rules to the policy dynamically.
I re-read your blog entries and I still fail to see how's systrace affected
by this. So just assume that I'm Dumb (tm) and please show me a
implementation-specific example of this, also consider that systrace is *not*
a MAC and it doesn't want to be one, we are systracing processes explicitely
here.
> "If I don't push yes this won't work", these systems have been shown
> time and time again to fail. And, like I already said, bypassing
> in-kernel DAC and capability restrictions means that there is now a
> single attack vector to gain all system privileges. This means systrace
> actually *removes* a layer of security from the system, which is clearly
> a bad idea.
It can only if you don't know how to configure/use it, which is something
that applies to SELinux, grsecurity, RSBAC and every other system. Feel free
to prove me wrong here with examples ;).
> >>http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
> >>http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/
> >>
> >
> On the blog is fine. Remember that those posts aren't targeting specific
> implementations (eg., grsec is not affected by all of the issues listed)
> but rather the model in general.
I'm curious, why's grsec not affecteced by this?
Cheers
--
Andrea Barisani <lcars@gentoo.org> .*.
Gentoo Linux Infrastructure Developer V
( )
PGP-Key 0x864C9B9E http://dev.gentoo.org/~lcars/pubkey.asc ( )
0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E ^^_^^
"Pluralitas non est ponenda sine necessitate"
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
2006-04-26 15:19 ` Andrea Barisani
@ 2006-04-26 16:59 ` Joshua Brindle
[not found] ` <850f7cbe0604261123l4b64000ag320a26cbe7dbb73e@mail.gmail.com>
2006-04-26 23:36 ` [gentoo-security] " Andrea Barisani
0 siblings, 2 replies; 12+ messages in thread
From: Joshua Brindle @ 2006-04-26 16:59 UTC (permalink / raw
To: gentoo-hardened, gentoo-security, Niels Provos
Andrea Barisani wrote:
> I re-read your blog entries and I still fail to see how's systrace affected
> by this. So just assume that I'm Dumb (tm) and please show me a
> implementation-specific example of this, also consider that systrace is *not*
> a MAC and it doesn't want to be one, we are systracing processes explicitely
> here.
>
>
Well, systrace is path based so you can apply all those arguments
directly. I don't understand what you mean by systrace is not MAC, what
is it? It has a policy, it enforces access control. I guess choosing to
run the app under it directly makes it discretionary. It still has all
the issues that my blog such as ambiguous paths, problems in shared
directories, etc.
>> "If I don't push yes this won't work", these systems have been shown
>> time and time again to fail. And, like I already said, bypassing
>> in-kernel DAC and capability restrictions means that there is now a
>> single attack vector to gain all system privileges. This means systrace
>> actually *removes* a layer of security from the system, which is clearly
>> a bad idea.
>>
>
> It can only if you don't know how to configure/use it, which is something
> that applies to SELinux, grsecurity, RSBAC and every other system. Feel free
> to prove me wrong here with examples ;).
>
What you are doing in essence is making all binaries setuid by allowing
privilege escalation. Think about it, setuid tells the linux kernel to
change the uid when this app is run, so you "remove" the setuid bit and
let systrace escalate the capabilities by bypassing the kernel, this is
not different from just having the binary be setuid and then only
allowing whichever caps it needs and is more dangerous since there is a
single layer controlling capabilities for an attack vector.
Neither grsecurity nor SELinux allow any kind of bypass of standard
linux kernel permissions. They cannot lower the security level of the
system whereas systrace can by granting capabilities that processes
would not have had otherwise.
>>>> http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
>>>> http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/
>>>>
>>>>
>> On the blog is fine. Remember that those posts aren't targeting specific
>> implementations (eg., grsec is not affected by all of the issues listed)
>> but rather the model in general.
>>
>
> I'm curious, why's grsec not affecteced by this?
>
grsec's access control is affected by many of them. Most grsec users
don't use the access control, however, they use the other protections
(the 80% attack vector thing..)
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
[not found] ` <850f7cbe0604261123l4b64000ag320a26cbe7dbb73e@mail.gmail.com>
@ 2006-04-26 18:54 ` Joshua Brindle
2006-04-26 23:02 ` Andrea Barisani
0 siblings, 1 reply; 12+ messages in thread
From: Joshua Brindle @ 2006-04-26 18:54 UTC (permalink / raw
To: Niels Provos; +Cc: gentoo-hardened, gentoo-security
Niels Provos wrote:
> On 4/26/06, Joshua Brindle <method@gentoo.org> wrote:
>
>> Well, systrace is path based so you can apply all those arguments
>> directly. I don't understand what you mean by systrace is not MAC, what
>> is it? It has a policy, it enforces access control. I guess choosing to
>>
>
> Let's take this opportunity to avoid misunderstandings. I don't know
> very much about mandatory access control nor SELinux in particular.
> However, I certainly support the statement that Systrace is not a MAC
> system nor does it want to be one. It would be great if you could
> help improve my understanding of SELinux by explaining the SELinux
> policy that governs, for example, your IRC client.
>
That is fair. If noone involved considers systrace MAC then I'm less
inclined to care about its availability, I'm still very concerned about
privilege escalation and user interaction. I will not concede that this
sort of activity (particularly the privilege escalation) is very dangerous.
SELinux is mandatory so the policy would already be loaded into the
kernel. The irc client executable would be labeled (something like
irc_exec_t). The user shell process would have a label (user_t) and
user_t executing irc_exec_t would cause a transition into user_irc_t.
The user_irc_t would then only have access to the resources it needs,
network, its own files in your home and tmp. Derived domains like
user_irc_t are used to seperate user apps from one another (without the
assistance of DAC).
There are tons of resources about how selinux works policy-wise though.
What in particular do you want to know?
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-hardened] Systrace resurrection
2006-04-26 18:54 ` Joshua Brindle
@ 2006-04-26 23:02 ` Andrea Barisani
0 siblings, 0 replies; 12+ messages in thread
From: Andrea Barisani @ 2006-04-26 23:02 UTC (permalink / raw
To: gentoo-hardened; +Cc: Niels Provos, gentoo-security
On Wed, Apr 26, 2006 at 02:54:15PM -0400, Joshua Brindle wrote:
> Niels Provos wrote:
>
> That is fair. If noone involved considers systrace MAC then I'm less
> inclined to care about its availability, I'm still very concerned about
> privilege escalation and user interaction. I will not concede that this
> sort of activity (particularly the privilege escalation) is very dangerous.
>
Even if it's only allowed to root and/or systraced processes ?
(let's remember that systrace is something that must be very selectively
enabled and that the privilege elevation thing is only available to root on
processes started with systrace)
--
Andrea Barisani <lcars@gentoo.org> .*.
Gentoo Linux Infrastructure Developer V
( )
PGP-Key 0x864C9B9E http://dev.gentoo.org/~lcars/pubkey.asc ( )
0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E ^^_^^
"Pluralitas non est ponenda sine necessitate"
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [gentoo-security] Re: [gentoo-hardened] Systrace resurrection
2006-04-26 16:59 ` Joshua Brindle
[not found] ` <850f7cbe0604261123l4b64000ag320a26cbe7dbb73e@mail.gmail.com>
@ 2006-04-26 23:36 ` Andrea Barisani
1 sibling, 0 replies; 12+ messages in thread
From: Andrea Barisani @ 2006-04-26 23:36 UTC (permalink / raw
To: gentoo-security; +Cc: gentoo-hardened, Niels Provos
On Wed, Apr 26, 2006 at 12:59:03PM -0400, Joshua Brindle wrote:
> Well, systrace is path based so you can apply all those arguments
> directly. I don't understand what you mean by systrace is not MAC, what
> is it? It has a policy, it enforces access control. I guess choosing to
> run the app under it directly makes it discretionary. It still has all
> the issues that my blog such as ambiguous paths, problems in shared
> directories, etc.
Did you bother checking how systrace checks/applies the path? (the tone isn't
accusatory here, I didn't do it yet myself, but still we can't flame it without
knowing its implementation, this is not as easy to evaluate as you try to put
it design-wise). Admitedly you don't know much about systrace implementation,
would you kindly check into it and see how it *really* works before judging it?
Not saying that this should make you change your mind but it would probably be
best and it would allow a much more constructive feedback.
Neils, any comments about this?
> What you are doing in essence is making all binaries setuid by allowing
> privilege escalation. Think about it, setuid tells the linux kernel to
"all binaries" ? I never said that I'd apply this to all binaries, systrace
is discretionary so to speak...
> change the uid when this app is run, so you "remove" the setuid bit and
> let systrace escalate the capabilities by bypassing the kernel, this is
> not different from just having the binary be setuid and then only
> allowing whichever caps it needs and is more dangerous since there is a
> single layer controlling capabilities for an attack vector.
>
systrace "becomes" a kernel feature, systrace "bypassing" the kernel makes no
sense to me, but I guess this is a semantic issue...
This is just moving the all-permissive setuid concept (which I might say can be
arguably a kinda broken/insecure thing) to a syscall acl framework.
> Neither grsecurity nor SELinux allow any kind of bypass of standard
> linux kernel permissions. They cannot lower the security level of the
> system whereas systrace can by granting capabilities that processes
> would not have had otherwise.
>
Systrace can lower the security level of the system if *you* configure it to
do so as *root* (which could do that anyway), this is just shifting the sec
model from 'setuid lets the process run as root but we "jail" it with MAC' to
"we remove setuid and we selectively allow kernel_side what it can do".
Unless you are really dumb in defining policies I can't see how this could be
heavily mis-used / compromised.
Neils, Method: all feedback is welcome.
Cheers
--
Andrea Barisani <lcars@gentoo.org> .*.
Gentoo Linux Infrastructure Developer V
( )
PGP-Key 0x864C9B9E http://dev.gentoo.org/~lcars/pubkey.asc ( )
0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E ^^_^^
"Pluralitas non est ponenda sine necessitate"
--
gentoo-hardened@gentoo.org mailing list
^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2006-04-26 23:38 UTC | newest]
Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-04-26 6:57 [gentoo-hardened] Systrace resurrection Andrea Barisani
2006-04-26 13:38 ` Joshua Brindle
2006-04-26 13:44 ` Andrea Barisani
2006-04-26 14:01 ` Joshua Brindle
2006-04-26 14:14 ` [gentoo-security] " Andrea Barisani
2006-04-26 14:36 ` pageexec
2006-04-26 14:58 ` Joshua Brindle
2006-04-26 15:19 ` Andrea Barisani
2006-04-26 16:59 ` Joshua Brindle
[not found] ` <850f7cbe0604261123l4b64000ag320a26cbe7dbb73e@mail.gmail.com>
2006-04-26 18:54 ` Joshua Brindle
2006-04-26 23:02 ` Andrea Barisani
2006-04-26 23:36 ` [gentoo-security] " Andrea Barisani
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox