Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752001AbZL3E6Q (ORCPT ); Tue, 29 Dec 2009 23:58:16 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751565AbZL3E6O (ORCPT ); Tue, 29 Dec 2009 23:58:14 -0500 Received: from ey-out-2122.google.com ([74.125.78.27]:38769 "EHLO ey-out-2122.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751536AbZL3E6N (ORCPT ); Tue, 29 Dec 2009 23:58:13 -0500 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; b=KzDTjtQ+HYVHK3pYVN0GbBnrfREDTymApiwiG0CBVF+wQOTEeb931lEplbKUcpslxj 8zkfRa5XJL1j18w8eANY9T4rbHmqjnGs3C/9ZSNfMHiO10LjFZhXZUKJUpDQoRCMKI6N e51ql3R8uShPdEWzmzehpsGpft7h+ZEejh3Ss= MIME-Version: 1.0 In-Reply-To: References: <20091229050114.GC14362@heat> <3e8340490912290805s103fb789y13acea4a84669b20@mail.gmail.com> <20091229211139.0732a0c1@lxorguk.ukuu.org.uk> <20091229223631.GB22578@us.ibm.com> <3e8340490912291954v5a837a26p64bd776102d281d7@mail.gmail.com> From: Bryan Donlan Date: Tue, 29 Dec 2009 23:57:50 -0500 Message-ID: <3e8340490912292057g3e87eaabn115f85b78af2b08c@mail.gmail.com> Subject: Re: [RFC][PATCH] Unprivileged: Disable acquisition of privileges To: "Eric W. Biederman" Cc: "Serge E. Hallyn" , Alan Cox , Benny Amorsen , Michael Stone , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Herbert Xu , Valdis Kletnieks , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?ISO-8859-1?Q?Am=E9rico_Wang?= , Tetsuo Handa , Samir Bellabes , Casey Schaufler , Pavel Machek , Al Viro Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1514 Lines: 34 On Tue, Dec 29, 2009 at 11:33 PM, Eric W. Biederman wrote: > Bryan Donlan writes: > >> Is this sufficient for other security models such as selinux or >> TOMOYO? Can processes in these models gain privileges through means >> not restricted here? > > The LSM is primarily about returning -EPERM more often. > Except for the prctl and the capability hooks I am not aware > of anywhere a LSM can increase a processes capabilities. I'm more concerned about a case where a privilege that the LSM currently denies is lifted by execing some executable - this is still an increase in privilege, even though the LSM only adds additional restrictions. That is: 1) Initial state: LSM denies access to /somefile (although normal POSIX permissions would permit access) 2) Disable capability-gaining 3) Disable network access with proposed API 4) Exec some application, which is labeled in a way that permits access to /somefile 5) Application fails to access the network, then does something to /somefile I'm not entirely sure if step 4) can happen in any of the currently existing LSMs - if it's not possible to gain privileges in them via a suid-like mechanism, this isn't a problem, but it's something that needs to be checked for. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/