|
Message-ID: <20110614083222.GA7973@albatros> Date: Tue, 14 Jun 2011 12:32:22 +0400 From: Vasiliy Kulikov <segoon@...nwall.com> To: kernel-hardening@...ts.openwall.com Subject: Re: add mount options to sysfs Solar, On Sat, Jun 04, 2011 at 00:00 +0400, Solar Designer wrote: > Also, I see no need for the uid= option. Maybe leave just gid= and > umask= for sysfs, debugfs, and configfs (pipacs reminded me of this one). While I've implemented gid= and umask= for sysfs as mount options, and for debugfs & configfs as sysctl variables (as they are not per-namespace, but global to the kernel), I think it makes much sense to implement CONFIG_{SYSFS,DEBUG_FS,CONFIGFS_FS}_{UMASK,GID} to be able to control permissions of files already created before userspace is able to change default permissions. Without configurable default umask/gid via CONFIG_* one should use "chmod -R /sys/" to alter already created files' perms, which is a bit inconsistent. Actual restrictions are simple, but sysctl handler for octal values (umask) and support of octal CONFIG_* values are needed. The former already exists, but witout octal printing. You may do: echo '0007' > /proc/sys/debug/debugfs_umask and it is parsed correctly. But output will be decimal. For CONFIG_*_UMASK one may not define octal values (more than 7), and numerics beginning from "0" are not parsed at all. sysctl part is not hard, but for CONFIG_ parsing I have to dive into kbuild sources, which I didn't touch yet at all. Looking at the number of places where e.g. S_HEX is used (parsing of hex values) I suppose it will be time consuming task. So, I think sysfs/debugfs/configfs umask=/gid= may be defered until all obviously necessary hardening features are applied into the upstream or at least discussed. Thanks, -- Vasiliy
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.