Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932986Ab1EZStG (ORCPT ); Thu, 26 May 2011 14:49:06 -0400 Received: from mail-fx0-f46.google.com ([209.85.161.46]:51090 "EHLO mail-fx0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758196Ab1EZStE (ORCPT ); Thu, 26 May 2011 14:49:04 -0400 MIME-Version: 1.0 In-Reply-To: References: <1305807728.11267.25.camel@gandalf.stny.rr.com> <1306254027.18455.47.camel@twins> <20110524195435.GC27634@elte.hu> <20110525150153.GE29179@elte.hu> <20110525180100.GY19633@outflux.net> <20110525191152.GC19633@outflux.net> Date: Thu, 26 May 2011 13:49:01 -0500 Message-ID: Subject: Re: [PATCH 3/5] v2 seccomp_filters: Enable ftrace-based system call filtering From: Will Drewry To: Linus Torvalds Cc: Colin Walters , Kees Cook , Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Steven Rostedt , linux-kernel@vger.kernel.org, James Morris Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1927 Lines: 46 On Thu, May 26, 2011 at 1:33 PM, Linus Torvalds wrote: > On Thu, May 26, 2011 at 10:38 AM, Will Drewry wrote: >>> >>> One option is to just not ever allow execve() from inside a restricted >>> environment. >> >> That'd certainly be fine with me. > > So if it ends up being purely a "internal to the process" thing, then > I'm much happier about it - it not only limits the scope of things > sufficiently that I don't worry too much about security issues, but it > makes it very clear that it's about a process going into "lock-down" > mode on its own. > > It also gets rid of all configuration - one of the things that makes > most security frameworks (look at selinux, but also just ACL's etc) > such a crazy rats nest is the whole "set up for other processes". If > it's designed very much to be about just the "self" process (after > initialization etc), then I think that avoids pretty much all the > serious issues. > > A lot of server processes could probably use it as a way to say "Hey, > I guarantee that I will only open new files read-only, and will only > write to the socket that was already opened for me by the accept", and > explicitly limit their worker threads that way. > > If that is really sufficient for some chrome sandboxing, then hey, > that's all fine. It adds some hoops, but less than exist today. > Sometimes limiting yourself (rather than looking for some bigger > "generic" solution) is the right answer. I will very happily validate usage and repost with a self-limited patch series. Doing so makes the change much more explicitly an expansion of seccomp, which keeps things sane. Thanks! will -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/