From: Joshua Brindle <method@gentoo.org>
To: gentoo-hardened@lists.gentoo.org,
gentoo-security@lists.gentoo.org,
Niels Provos <provos@citi.umich.edu>
Subject: Re: [gentoo-hardened] Systrace resurrection
Date: Wed, 26 Apr 2006 12:59:03 -0400 [thread overview]
Message-ID: <444FA6D7.6070602@gentoo.org> (raw)
In-Reply-To: <20060426151925.GQ29037@fuse.inversepath.com>
Andrea Barisani wrote:
> I re-read your blog entries and I still fail to see how's systrace affected
> by this. So just assume that I'm Dumb (tm) and please show me a
> implementation-specific example of this, also consider that systrace is *not*
> a MAC and it doesn't want to be one, we are systracing processes explicitely
> here.
>
>
Well, systrace is path based so you can apply all those arguments
directly. I don't understand what you mean by systrace is not MAC, what
is it? It has a policy, it enforces access control. I guess choosing to
run the app under it directly makes it discretionary. It still has all
the issues that my blog such as ambiguous paths, problems in shared
directories, etc.
>> "If I don't push yes this won't work", these systems have been shown
>> time and time again to fail. And, like I already said, bypassing
>> in-kernel DAC and capability restrictions means that there is now a
>> single attack vector to gain all system privileges. This means systrace
>> actually *removes* a layer of security from the system, which is clearly
>> a bad idea.
>>
>
> It can only if you don't know how to configure/use it, which is something
> that applies to SELinux, grsecurity, RSBAC and every other system. Feel free
> to prove me wrong here with examples ;).
>
What you are doing in essence is making all binaries setuid by allowing
privilege escalation. Think about it, setuid tells the linux kernel to
change the uid when this app is run, so you "remove" the setuid bit and
let systrace escalate the capabilities by bypassing the kernel, this is
not different from just having the binary be setuid and then only
allowing whichever caps it needs and is more dangerous since there is a
single layer controlling capabilities for an attack vector.
Neither grsecurity nor SELinux allow any kind of bypass of standard
linux kernel permissions. They cannot lower the security level of the
system whereas systrace can by granting capabilities that processes
would not have had otherwise.
>>>> http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
>>>> http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/
>>>>
>>>>
>> On the blog is fine. Remember that those posts aren't targeting specific
>> implementations (eg., grsec is not affected by all of the issues listed)
>> but rather the model in general.
>>
>
> I'm curious, why's grsec not affecteced by this?
>
grsec's access control is affected by many of them. Most grsec users
don't use the access control, however, they use the other protections
(the 80% attack vector thing..)
--
gentoo-hardened@gentoo.org mailing list
next prev parent reply other threads:[~2006-04-26 17:04 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-04-26 6:57 [gentoo-hardened] Systrace resurrection Andrea Barisani
2006-04-26 13:38 ` Joshua Brindle
2006-04-26 13:44 ` Andrea Barisani
2006-04-26 14:01 ` Joshua Brindle
2006-04-26 14:14 ` [gentoo-security] " Andrea Barisani
2006-04-26 14:36 ` pageexec
2006-04-26 14:58 ` Joshua Brindle
2006-04-26 15:19 ` Andrea Barisani
2006-04-26 16:59 ` Joshua Brindle [this message]
[not found] ` <850f7cbe0604261123l4b64000ag320a26cbe7dbb73e@mail.gmail.com>
2006-04-26 18:54 ` Joshua Brindle
2006-04-26 23:02 ` Andrea Barisani
2006-04-26 23:36 ` [gentoo-security] " Andrea Barisani
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=444FA6D7.6070602@gentoo.org \
--to=method@gentoo.org \
--cc=gentoo-hardened@lists.gentoo.org \
--cc=gentoo-security@lists.gentoo.org \
--cc=provos@citi.umich.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox