Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752559AbZL2UfS (ORCPT ); Tue, 29 Dec 2009 15:35:18 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752528AbZL2UfQ (ORCPT ); Tue, 29 Dec 2009 15:35:16 -0500 Received: from gate1.ipvision.dk ([94.127.49.2]:59040 "EHLO gate1.ipvision.dk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752409AbZL2UfO (ORCPT ); Tue, 29 Dec 2009 15:35:14 -0500 X-Greylist: delayed 1480 seconds by postgrey-1.27 at vger.kernel.org; Tue, 29 Dec 2009 15:35:14 EST From: Benny Amorsen To: Bryan Donlan Cc: "Serge E. Hallyn" , "Eric W. Biederman" , Michael Stone , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Alan Cox , Herbert Xu , Valdis Kletnieks , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?utf-8?Q?Am=C3=A9rico?= Wang , Tetsuo Handa , Samir Bellabes , Casey Schaufler , Pavel Machek , Al Viro Subject: Re: RFC: disablenetwork facility. (v4) References: <20091229050114.GC14362@heat> <20091229151146.GA32153@us.ibm.com> <3e8340490912290805s103fb789y13acea4a84669b20@mail.gmail.com> Date: Tue, 29 Dec 2009 21:10:11 +0100 In-Reply-To: <3e8340490912290805s103fb789y13acea4a84669b20@mail.gmail.com> (Bryan Donlan's message of "Tue, 29 Dec 2009 11:05:09 -0500") Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Spam-Score: -4.1 (----) X-Spam-Report: ALL_TRUSTED=-3.3, AWL=-0.568, BAYES_40=-0.185 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 930 Lines: 24 Bryan Donlan writes: > I, for one, think it would be best to handle it exactly like the > nosuid mount option - that is, pretend the file doesn't have any > setuid bits set. There's no reason to deny execution; if the process > would otherwise be able to execute it, it can also copy the file to > make a non-suid version and execute that instead. Execute != read. The executable file may contain secrets which must not be available to the user running the setuid program. If you fail the setuid, the user will be able to ptrace() and then the secret is revealed. It's amazing how many security holes appear from what seems like a very simple request. /Benny -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/