Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933001AbbGJRQ2 (ORCPT ); Fri, 10 Jul 2015 13:16:28 -0400 Received: from smtp105.biz.mail.bf1.yahoo.com ([98.139.221.43]:36754 "EHLO smtp105.biz.mail.bf1.yahoo.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932427AbbGJRQS (ORCPT ); Fri, 10 Jul 2015 13:16:18 -0400 X-Yahoo-Newman-Property: ymail-3 X-YMail-OSG: dp34nq4VM1ksrGK_51FFQlevWRMcPAAzYX3cL_nPIjo1z5. qnr5DggUDqhnqjDCpEQr2JMV7AQNxgRuPnNyPqXZEauee_tjhUNtlsgtVMwB RXa9x4Qjg_ovjYCYlQ3GgBQ2rKPV7CD1K.ohT1oCTO9O74axnabo67kuYwBV A5YU8PWZLWEQODQGe.cz_S3U9FJqTCOI3ijx1LFryHGk_zQai00PT07UjTy2 hwiI1hb6au8rmXYBQ98.v35dy9e2tmXdsesBKLxb2dQmQs70Cv04gfyme989 3yHQwzBlTBMVB7uieROm9cZeWMur.wIXVB0HSBe1k_tR1audY8ohGyVT1kAO PaICTyH27cUeJkwgrwfNcOUSflsR6hEWun9oQR0poZfxMQr2J22U3G1WtV7B nCwokGUfPh5WbpWJyychVFj2qLN0_DKrFGCbWmleqOBUvS.8ngQ2IMUsvdHT fXLbX3mSJySF1zKCFHbE6yWqXDq.lfCa4U_FqY._LObRZhw4HoAyLAOYSp4a s7vkrp0ESP3M6JTNIDKF4ZgegSMQCeBoNwTgCMkZZ5s2.S1bq9dkLSd1Lk5c - X-Yahoo-SMTP: OIJXglSswBDfgLtXluJ6wiAYv6_cnw-- Message-ID: <559FFDDF.2090302@schaufler-ca.com> Date: Fri, 10 Jul 2015 10:16:15 -0700 From: Casey Schaufler User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 MIME-Version: 1.0 To: David Herrmann CC: Stephen Smalley , Greg KH , Daniel Mack , Djalal Harouni , lkml , LSM , Paul Osmialowski , Paul Moore Subject: Re: kdbus: credential faking References: <559EBCC0.7040604@tycho.nsa.gov> <559FC7DD.8060507@tycho.nsa.gov> <559FEBF2.1040908@schaufler-ca.com> In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1168 Lines: 31 On 7/10/2015 9:26 AM, David Herrmann wrote: > Hi > > On Fri, Jul 10, 2015 at 5:59 PM, Casey Schaufler wrote: > [...] >> There are so many ways uids are being (miss/ab)used >> on Linux systems these days that the idea of trusting a bus just >> because its non-root uid is listed in a table somewhere (or worse, >> coded in an API) is asking for exploits. > Please elaborate on these possible exploits. I'd also like to hear, > whether the same applies to the already used '/run/user//bus', > which follows nearly the same model. Sorry, I'm not the exploit generator guy. If I where, I would point out that the application expecting the uid to identify a person is going to behave incorrectly on the system that uses the uid to identify an application. I never said that I liked /run/user//bus. Come to think of it, I never said I like dbus, either. > > Thanks > David > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/