|
Message-ID: <CA+DvKQ+9xddJc6+29NXzb81gmt4mYRmUTsi=-42aVy3=xgt3bw@mail.gmail.com> Date: Tue, 30 May 2017 12:44:56 -0400 From: Daniel Micay <danielmicay@...il.com> To: Matt Brown <matt@...tt.com> Cc: Alan Cox <gnomes@...rguk.ukuu.org.uk>, Casey Schaufler <casey@...aufler-ca.com>, Boris Lukashev <blukashev@...pervictus.com>, Greg KH <gregkh@...uxfoundation.org>, "Serge E. Hallyn" <serge@...lyn.com>, Kees Cook <keescook@...omium.org>, Kernel Hardening <kernel-hardening@...ts.openwall.com>, linux-security-module <linux-security-module@...r.kernel.org>, linux-kernel <linux-kernel@...r.kernel.org> Subject: Re: Re: [PATCH v7 2/2] security: tty: make TIOCSTI ioctl require CAP_SYS_ADMIN > Seccomp requires the program in question to "opt-in" so to speak and set > certain restrictions on itself. However as you state above, any TIOCSTI > protection doesn't matter if the program correctly allocates a tty/pty pair. > This protections seeks to protect users from programs that don't do things > correctly. Rather than killing bugs, this feature attempts to kill an entire > bug class that shows little sign of slowing down in the world of containers and > sandboxes. It's possible to do it in PID1 as root without NO_NEW_PRIVS set, but there isn't an existing implementation of that. It's not included in init systems like systemd. There's no way to toggle that off at runtime one that's done like this sysctl though. If a system administrator wants to enable it, they'll need to modify a configuration file and reboot if it was even supported by the init system. It's the same argument that was used against perf_event_paranoid=3. Meanwhile, perf_event_paranoid=3 is a mandatory requirement for every Android device and toggling it at runtime is *necessary* since that's exposed as a system property writable by the Android Debug Bridge shell user (i.e. physical access via USB + ADB enabled within the OS + ADB key of the ADB client accepted). There's less use case for TIOCSTI so toggling it on at runtime isn't as important, but a toggle like this is a LOT friendlier than a seccomp blacklist even if that was supported by common init systems, and it's not.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.