Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754043Ab0AJVvw (ORCPT ); Sun, 10 Jan 2010 16:51:52 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753997Ab0AJVvv (ORCPT ); Sun, 10 Jan 2010 16:51:51 -0500 Received: from lists.laptop.org ([18.85.2.145]:33524 "EHLO mail.laptop.org" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753982Ab0AJVvu (ORCPT ); Sun, 10 Jan 2010 16:51:50 -0500 Date: Sun, 10 Jan 2010 16:54:09 -0500 From: Michael Stone To: James Morris Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Alan Cox , Herbert Xu , Valdis Kletnieks , Bryan Donlan , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , "Eric W. Biederman" , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?iso-8859-1?Q?Am=E9rico?= Wang , Tetsuo Handa , Samir Bellabes , Casey Schaufler , "Serge E. Hallyn" , Pavel Machek , Al Viro , Michael Stone Subject: Re: [PATCH 2/3] Security: Implement disablenetwork semantics. (v4) Message-ID: <20100110215409.GA3705@heat> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1551 Lines: 42 On Fri, 1 Jan 2010, Pavel Machek wrote: > > > Quoting Michael Stone (michael@laptop.org): > > > > Implement security_* hooks for socket_create, socket_bind, socket_connect, > > > > socket_sendmsg, and ptrace_access_check which return -EPERM when called from a > > > > process with networking restrictions. Exempt AF_UNIX sockets. > > > > > > > > Signed-off-by: Michael Stone > > > > > > Acked-by: Serge Hallyn > > > > For the record: NAK, as it introduces security holes. > > Please elaborate. Pavel's position is that disablenetwork is likely to permit some attacker somewhere to deny network access to some setuid app some day in a way that violates some security policy. He has mentioned specific concern over scenarios like: Alice configures PAM auth to 'fail open' by checking login credentials against a restrictive LDAP server and, if the server is unavailable, against a very permissive files database. Alice updates her kernel to a version with disablenetwork. Mallory calls disablenetwork, calls su -, and vanquishes all. My position is that better isolation facilities like disablenetwork will prevent far more grievous security faults than they (theoretically) cause. What is your perspective on the matter? Regards, Michael -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/