Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758991Ab0KPW6z (ORCPT ); Tue, 16 Nov 2010 17:58:55 -0500 Received: from tango.0pointer.de ([85.214.72.216]:51744 "EHLO tango.0pointer.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756780Ab0KPW6y (ORCPT ); Tue, 16 Nov 2010 17:58:54 -0500 Date: Tue, 16 Nov 2010 23:58:35 +0100 From: Lennart Poettering To: Alan Cox Cc: Kay Sievers , linux-kernel , Greg KH , Werner Fink , Jiri Slaby Subject: Re: tty: add 'active' sysfs attribute to tty0 and console device Message-ID: <20101116225834.GA27594@tango.0pointer.de> References: <1289922400.1253.3.camel@yio.site> <20101116155717.6671e484@lxorguk.ukuu.org.uk> <20101116171447.29336514@lxorguk.ukuu.org.uk> <20101116195538.7fa66b97@lxorguk.ukuu.org.uk> <20101116204906.29d840e9@lxorguk.ukuu.org.uk> <20101116214250.GB17824@tango.0pointer.de> <20101116225138.4e09f4dc@lxorguk.ukuu.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20101116225138.4e09f4dc@lxorguk.ukuu.org.uk> Organization: Red Hat, Inc. X-Campaign-1: () ASCII Ribbon Campaign X-Campaign-2: / Against HTML Email & vCards - Against Microsoft Attachments User-Agent: Leviathan/19.8.0 [zh] (Cray 3; I; Solaris 4.711; Console) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1925 Lines: 46 On Tue, 16.11.10 22:51, Alan Cox (alan@lxorguk.ukuu.org.uk) wrote: > > On Tue, 16 Nov 2010 22:42:50 +0100 > Lennart Poettering wrote: > > > On Tue, 16.11.10 20:49, Alan Cox (alan@lxorguk.ukuu.org.uk) wrote: > > > > > /dev/tty* and sysfs nodes don't track permissions, owner with each other, > > > so you are providing interfaces that either expose information they > > > shouldn't (which screen is valuable info in some environments), or don't > > > expose info they should. > > > > Well, I find the informatoin who is logged in much more valuable then > > the information whether I am active or not. > > Well thats fine for your machine, what about the rest of us ? I think most people (except maybe you) find it more security relevant if it is leaked who's logged in and on which tty then it is to know whether that's the active session or not. And as long as we have no problem with letting everybody know who is logged in, and on which tty we shouldn't waste brain cells on discussing whether it is a problem if they also find out whether that login is currently active or not. Also, sysfs supports perms just fine. If you don't want people to see it, then just chmod 600 the sysfs file, and nobody can see it anymore. That's a trivial thing to do. It's a lot more difficult to hide who's logged in, since the user who is logged in takes possession of the tty file which everybody can see and stat(), even if not open(). This is really a pointless discussion. Security is not an issue here. Which tty is currently active is completely boring information, and the least we should think about. Lennart -- Lennart Poettering - Red Hat, Inc. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/