Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752572AbZL0QeI (ORCPT ); Sun, 27 Dec 2009 11:34:08 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752492AbZL0QeG (ORCPT ); Sun, 27 Dec 2009 11:34:06 -0500 Received: from lists.laptop.org ([18.85.2.145]:50987 "EHLO mail.laptop.org" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752342AbZL0QeF (ORCPT ); Sun, 27 Dec 2009 11:34:05 -0500 Date: Sun, 27 Dec 2009 11:36:10 -0500 From: Michael Stone To: "Serge E. Hallyn" Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Alan Cox , Herbert Xu , Valdis Kletnieks , Bryan Donlan , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , "Eric W. Biederman" , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?iso-8859-1?Q?Am=E9rico?= Wang , Tetsuo Handa , Samir Bellabes , Casey Schaufler , Pavel Machek , Michael Stone Subject: Re: RFC: disablenetwork facility. (v4) Message-ID: <20091227163609.GD12645@heat> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20091227161203.GA20031@hallyn.com> User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1828 Lines: 43 Serge Hallyn writes: > Michael Stone writes: >> The first reason why I'm not too worried is that anyone in a position to use >> disablenetwork for nefarious purposes is also probably able to use ptrace(), >> kill(), and/or LD_PRELOAD to similar ends. > > How do you mean? I meant that, with the current interface, to set disablenetwork for pid P, you have either be pid P or to have been one of P's ancestors. In either case, you have lots of opportunity to mess with P's environment. > I thought that disabling network was a completely > unprivileged operation? And subsequently executing a setuid-root > application won't reset the flag. Correct and correct for the current patches. >> The second reason why I'm not too worried is that I believe it to be >> straightforward to use the pre-existing MAC frameworks to prevent individually >> important processes from dropping networking privileges. >> >> Do you have a specific concern in mind not addressed by either of these >> observations? > > Near as I can tell the worst one could do would be to prevent remote > admins from getting useful audit messages, which could give you unlimited > time to keep re-trying the server, on your quest to a brute-force attack > of some sort, i.e. restarting the server with random passwords, and now > no audit msg about the wrong password gets generated, so you're free to > exhaust the space of valid passwords. > > Not saying I'm all that worried about it - just something that came to > mind. I'll think about it further. Fortunately, there's no need to be hasty. :) Michael -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/