Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752004AbZL3DzZ (ORCPT ); Tue, 29 Dec 2009 22:55:25 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751718AbZL3DzY (ORCPT ); Tue, 29 Dec 2009 22:55:24 -0500 Received: from mail-ew0-f219.google.com ([209.85.219.219]:52345 "EHLO mail-ew0-f219.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751565AbZL3DzX convert rfc822-to-8bit (ORCPT ); Tue, 29 Dec 2009 22:55:23 -0500 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type:content-transfer-encoding; b=IK4RBgFKwfld8x9/8cel7q5ZRr/IUTs5vqGhnEVW6tUrGGOfyHPbDKLvcdhwxFSjD4 /ZuGcrtLJezaHRPSUToy2HfF88cClEQUh5Z/EW+iY1qMdkAgDVW6w9qsPambVU+63DPN 9zPOWz1YF+oo7/3OyVZrn0UUIItSwomk9p6pU= MIME-Version: 1.0 In-Reply-To: References: <20091229050114.GC14362@heat> <20091229151146.GA32153@us.ibm.com> <3e8340490912290805s103fb789y13acea4a84669b20@mail.gmail.com> <20091229211139.0732a0c1@lxorguk.ukuu.org.uk> <20091229223631.GB22578@us.ibm.com> From: Bryan Donlan Date: Tue, 29 Dec 2009 22:54:59 -0500 Message-ID: <3e8340490912291954v5a837a26p64bd776102d281d7@mail.gmail.com> Subject: Re: [RFC][PATCH] Unprivileged: Disable acquisition of privileges To: "Eric W. Biederman" Cc: "Serge E. Hallyn" , Alan Cox , Benny Amorsen , Michael Stone , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Herbert Xu , Valdis Kletnieks , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?ISO-8859-1?Q?Am=E9rico_Wang?= , Tetsuo Handa , Samir Bellabes , Casey Schaufler , Pavel Machek , Al Viro Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1642 Lines: 38 On Tue, Dec 29, 2009 at 10:35 PM, Eric W. Biederman wrote: > > If we can know that a process will never raise it's priveleges we can > enable a lot of features that otherwise would be unsafe, because they > could break assumptions of existing suid executables. > > To allow this to be used as a sand boxing feature also disable > ptracing other executables without this new restriction. > > For the moment I have used a per thread flag because we are out of per > process flags. > > To ensure all descendants get this flag I rely on the default copying > of procss structures. > > The disabling of suid executables is exactly the same as MNT_NOSUID. > > This should be what we have been talking about in for disabling of > suid exec. ?I choose not to use securebits as that interface requires > privilege and assumes capabilities. ?This implementation is more basic > than capabilities and only adds additional sanity checks when > linux capabilities are not present. > > I attempt to ensure there are no mixed priveleges present, when we > perform the disable so I don't need to handle or think about > interactions with setreuid or capabilities in this code. Is this sufficient for other security models such as selinux or TOMOYO? Can processes in these models gain privileges through means not restricted here? Also, perhaps there should be a corresponding GET prctl? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/