public inbox for gentoo-hardened@lists.gentoo.org
 help / color / mirror / Atom feed
From: Joshua Brindle <method@gentoo.org>
To: gentoo-hardened@lists.gentoo.org,
	gentoo-security@lists.gentoo.org,
	Niels Provos <provos@citi.umich.edu>
Subject: Re: [gentoo-hardened] Systrace resurrection
Date: Wed, 26 Apr 2006 12:59:03 -0400	[thread overview]
Message-ID: <444FA6D7.6070602@gentoo.org> (raw)
In-Reply-To: <20060426151925.GQ29037@fuse.inversepath.com>

Andrea Barisani wrote:
> I re-read your blog entries and I still fail to see how's systrace affected
> by this. So just assume that I'm Dumb (tm) and please show me a
> implementation-specific example of this, also consider that systrace is *not*
> a MAC and it doesn't want to be one, we are systracing processes explicitely
> here.
>
>   
Well, systrace is path based so you can apply all those arguments 
directly. I don't understand what you mean by systrace is not MAC, what 
is it? It has a policy, it enforces access control. I guess choosing to 
run the app under it directly makes it discretionary. It still has all 
the issues that my blog such as ambiguous paths, problems in shared 
directories, etc.
>> "If I don't push yes this won't work", these systems have been shown 
>> time and time again to fail. And, like I already said, bypassing 
>> in-kernel DAC and capability restrictions means that there is now a 
>> single attack vector to gain all system privileges. This means systrace 
>> actually *removes* a layer of security from the system, which is clearly 
>> a bad idea.
>>     
>
> It can only if you don't know how to configure/use it, which is something
> that applies to SELinux, grsecurity, RSBAC and every other system. Feel free
> to prove me wrong here with examples ;).
>   
What you are doing in essence is making all binaries setuid by allowing 
privilege escalation. Think about it, setuid tells the linux kernel to 
change the uid when this app is run, so you "remove" the setuid bit and 
let systrace escalate the capabilities by bypassing the kernel, this is 
not different from just having the binary be setuid and then only 
allowing whichever caps it needs and is more dangerous since there is a 
single layer controlling capabilities for an attack vector.

Neither grsecurity nor SELinux allow any kind of bypass of standard 
linux kernel permissions. They cannot lower the security level of the 
system whereas systrace can by granting capabilities that processes 
would not have had otherwise.

>>>> http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
>>>> http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/
>>>>    
>>>>         
>> On the blog is fine. Remember that those posts aren't targeting specific 
>> implementations (eg., grsec is not affected by all of the issues listed) 
>> but rather the model in general.
>>     
>
> I'm curious, why's grsec not affecteced by this?
>   
grsec's access control is affected by many of them. Most grsec users 
don't use the access control, however, they use the other protections 
(the 80% attack vector thing..)
-- 
gentoo-hardened@gentoo.org mailing list



  reply	other threads:[~2006-04-26 17:04 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2006-04-26  6:57 [gentoo-hardened] Systrace resurrection Andrea Barisani
2006-04-26 13:38 ` Joshua Brindle
2006-04-26 13:44   ` Andrea Barisani
2006-04-26 14:01     ` Joshua Brindle
2006-04-26 14:14       ` [gentoo-security] " Andrea Barisani
2006-04-26 14:36       ` pageexec
2006-04-26 14:58         ` Joshua Brindle
2006-04-26 15:19           ` Andrea Barisani
2006-04-26 16:59             ` Joshua Brindle [this message]
     [not found]               ` <850f7cbe0604261123l4b64000ag320a26cbe7dbb73e@mail.gmail.com>
2006-04-26 18:54                 ` Joshua Brindle
2006-04-26 23:02                   ` Andrea Barisani
2006-04-26 23:36               ` [gentoo-security] " Andrea Barisani

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=444FA6D7.6070602@gentoo.org \
    --to=method@gentoo.org \
    --cc=gentoo-hardened@lists.gentoo.org \
    --cc=gentoo-security@lists.gentoo.org \
    --cc=provos@citi.umich.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox