public inbox for gentoo-hardened@lists.gentoo.org
 help / color / mirror / Atom feed
From: Andrea Barisani <lcars@gentoo.org>
To: gentoo-security@lists.gentoo.org
Cc: gentoo-hardened@lists.gentoo.org, Niels Provos <provos@citi.umich.edu>
Subject: Re: [gentoo-security] Re: [gentoo-hardened] Systrace resurrection
Date: Wed, 26 Apr 2006 23:36:05 +0000	[thread overview]
Message-ID: <20060426233605.GK29037@fuse.inversepath.com> (raw)
In-Reply-To: <444FA6D7.6070602@gentoo.org>

On Wed, Apr 26, 2006 at 12:59:03PM -0400, Joshua Brindle wrote:
> Well, systrace is path based so you can apply all those arguments 
> directly. I don't understand what you mean by systrace is not MAC, what 
> is it? It has a policy, it enforces access control. I guess choosing to 
> run the app under it directly makes it discretionary. It still has all 
> the issues that my blog such as ambiguous paths, problems in shared 
> directories, etc.

Did you bother checking how systrace checks/applies the path? (the tone isn't
accusatory here, I didn't do it yet myself, but still we can't flame it without 
knowing its implementation, this is not as easy to evaluate as you try to put 
it design-wise). Admitedly you don't know much about systrace implementation, 
would you kindly check into it and see how it *really* works before judging it? 
Not saying that this should make you change your mind but it would probably be 
best and it would allow a much more constructive feedback.

Neils, any comments about this?

> What you are doing in essence is making all binaries setuid by allowing 
> privilege escalation. Think about it, setuid tells the linux kernel to 

"all binaries" ? I never said that I'd apply this to all binaries, systrace
is discretionary so to speak...

> change the uid when this app is run, so you "remove" the setuid bit and 
> let systrace escalate the capabilities by bypassing the kernel, this is 
> not different from just having the binary be setuid and then only 
> allowing whichever caps it needs and is more dangerous since there is a 
> single layer controlling capabilities for an attack vector.
> 

systrace "becomes" a kernel feature, systrace "bypassing" the kernel makes no 
sense to me, but I guess this is a semantic issue...

This is just moving the all-permissive setuid concept (which I might say can be 
arguably a kinda broken/insecure thing) to a syscall acl framework.

> Neither grsecurity nor SELinux allow any kind of bypass of standard 
> linux kernel permissions. They cannot lower the security level of the 
> system whereas systrace can by granting capabilities that processes 
> would not have had otherwise.
> 

Systrace can lower the security level of the system if *you* configure it to
do so as *root* (which could do that anyway), this is just shifting the sec
model from 'setuid lets the process run as root but we "jail" it with MAC' to
"we remove setuid and we selectively allow kernel_side what it can do".

Unless you are really dumb in defining policies I can't see how this could be
heavily mis-used / compromised.

Neils, Method: all feedback is welcome.

Cheers

-- 
Andrea Barisani <lcars@gentoo.org>                            .*.
Gentoo Linux Infrastructure Developer                          V
                                                             (   )
PGP-Key 0x864C9B9E http://dev.gentoo.org/~lcars/pubkey.asc   (   )
    0A76 074A 02CD E989 CE7F AC3F DA47 578E 864C 9B9E        ^^_^^
      "Pluralitas non est ponenda sine necessitate"
-- 
gentoo-hardened@gentoo.org mailing list



      parent reply	other threads:[~2006-04-26 23:38 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2006-04-26  6:57 [gentoo-hardened] Systrace resurrection Andrea Barisani
2006-04-26 13:38 ` Joshua Brindle
2006-04-26 13:44   ` Andrea Barisani
2006-04-26 14:01     ` Joshua Brindle
2006-04-26 14:14       ` [gentoo-security] " Andrea Barisani
2006-04-26 14:36       ` pageexec
2006-04-26 14:58         ` Joshua Brindle
2006-04-26 15:19           ` Andrea Barisani
2006-04-26 16:59             ` Joshua Brindle
     [not found]               ` <850f7cbe0604261123l4b64000ag320a26cbe7dbb73e@mail.gmail.com>
2006-04-26 18:54                 ` Joshua Brindle
2006-04-26 23:02                   ` Andrea Barisani
2006-04-26 23:36               ` Andrea Barisani [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20060426233605.GK29037@fuse.inversepath.com \
    --to=lcars@gentoo.org \
    --cc=gentoo-hardened@lists.gentoo.org \
    --cc=gentoo-security@lists.gentoo.org \
    --cc=provos@citi.umich.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox