|
|
Message-ID: <alpine.LRH.2.20.1702150952360.6813@namei.org>
Date: Wed, 15 Feb 2017 09:55:25 +1100 (AEDT)
From: James Morris <jmorris@...ei.org>
To: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
cc: linux-security-module@...r.kernel.org, selinux@...ho.nsa.gov,
kernel-hardening@...ts.openwall.com
Subject: Re: [RFC v2 PATCH 1/2] security: introduce
CONFIG_SECURITY_WRITABLE_HOOKS
On Tue, 14 Feb 2017, Tetsuo Handa wrote:
> > diff --git a/security/Kconfig b/security/Kconfig
> > index 118f454..f6f90c4 100644
> > --- a/security/Kconfig
> > +++ b/security/Kconfig
> > @@ -31,6 +31,11 @@ config SECURITY
> >
> > If you are unsure how to answer this question, answer N.
> >
> > +config SECURITY_WRITABLE_HOOKS
> > + depends on SECURITY
> > + bool
> > + default n
> > +
>
> This configuration option must not be set to N without big fat explanation
> about implications of setting this option to N.
It's not visible in the config menu, it's only there to support SELinux
runtime disablement, otherwise it wouldn't even be an option.
>
> Honestly, I still don't like this option, regardless of whether SELinux
> needs this option or not.
>
I agree, it would be better to just enable RO hardening without an option
to disable it.
--
James Morris
<jmorris@...ei.org>
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.