Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753162AbbGKLaz (ORCPT ); Sat, 11 Jul 2015 07:30:55 -0400 Received: from mail-ob0-f182.google.com ([209.85.214.182]:33332 "EHLO mail-ob0-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752325AbbGKLax (ORCPT ); Sat, 11 Jul 2015 07:30:53 -0400 MIME-Version: 1.0 In-Reply-To: <55A01099.4030708@schaufler-ca.com> References: <559EBCC0.7040604@tycho.nsa.gov> <559FC7DD.8060507@tycho.nsa.gov> <559FEBF2.1040908@schaufler-ca.com> <559FFDDF.2090302@schaufler-ca.com> <55A01099.4030708@schaufler-ca.com> Date: Sat, 11 Jul 2015 13:30:52 +0200 Message-ID: Subject: Re: kdbus: credential faking From: Richard Weinberger To: Casey Schaufler Cc: David Herrmann , Stephen Smalley , Greg KH , Daniel Mack , Djalal Harouni , lkml , LSM , Paul Osmialowski , Paul Moore Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1285 Lines: 27 On Fri, Jul 10, 2015 at 8:36 PM, Casey Schaufler wrote: > On some systems the uid is being used as an application identifier > instead of a human identifier. The access controls are not designed > for this. The POSIX capabilities aren't designed for this. If Fred > creates a program that is setuid to fred and gets Barney to run it, > you hold Fred accountable. If a malicious (or compromised) application > identified by "fred" creates a setuid fred program and the "barney" > application runs it, who do you hold accountable? It's a completely > different mindset. Sure, you can wedge the one into the other, but > it's not the intended use. Hence, misuse or abuse. Actually that's an interesting thought. The question is whether the /run/user//bus security model works also for "special" userland like Android. To my knowledge on Android each application runs as different user. If kdbus gets merged it would be nice to have to work with all kinds of userland and not only Fedora. -- Thanks, //richard -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/