From: Florian Weimer <fweimer@redhat.com>
To: kernel-hardening@lists.openwall.com
Subject: Re: [kernel-hardening] System call interface changes
Date: Mon, 7 Dec 2015 16:44:12 +0100 [thread overview]
Message-ID: <5665A94C.6060102@redhat.com> (raw)
In-Reply-To: <CAGXu5j+zRXuiTipU=6VVoxacsYWcjhaax4gVbGRXteLihXVdOQ@mail.gmail.com>
On 11/24/2015 10:43 PM, Kees Cook wrote:
> Cool. Well, we can certainly look at existing public exploits and
> PoCs. That's what I've been trying to collect on the Kernel
> Self-Protection Project wiki pages. There are plenty of things we
> could add to that list from the ROP world. Maybe it'd be good to look
> through various exploit lists to find stuff that use techniques that
> are either missing from the wiki page or are better examples? Do you
> (or someone else) have time to go on a research/collection exercise?
The proposal I have (and which prompted the question about the system
call interface) is to block execve because many proof-of-concept exploit
use execve or system to spawn a shell or run arbitrary commands.
But I'm concerned that it's basically the same thing Yves-Alexis mention
in the discussion about commit_creds(prepare_creds(0)):
<http://www.openwall.com/lists/kernel-hardening/2015/11/26/8>
So execve is perhaps just a demo, just like running CALC.EXE on Windows.
I'm worried that execve blocking is a bit like renaming CALC.EXE in
terms of impact regarding actual successful compromises, that is, it
won't make a difference.
In terms of actual impact on compromised Linux servers, SAML support in
FTP, OpenSSH and sudo, combined with popular Windows clients that can
interoperate (I don't know if people still use WinSCP) would probably
reduce compromises due to leaked credentials substantially. My hunch is
that such compromises (even delayed reuse of credentials) cover by far
the largest number of server compromises. But this is an extremely
high-level issue—we are basically providing mitigation for a client-side
issue, where we don't control the client at all. And large scale web
hosters primarily affected by this do not approach us with such
requirements, as far as I know.
Florian
next prev parent reply other threads:[~2015-12-07 15:44 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-11-20 10:30 [kernel-hardening] System call interface changes Florian Weimer
2015-11-20 19:16 ` Rich Felker
2015-11-24 19:54 ` Florian Weimer
2015-11-24 20:29 ` Rich Felker
2015-11-24 20:10 ` Kees Cook
2015-11-24 20:54 ` Florian Weimer
2015-11-24 21:43 ` Kees Cook
2015-12-07 15:44 ` Florian Weimer [this message]
2015-12-07 16:26 ` lazytyped
2015-11-24 22:33 ` Rich Felker
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5665A94C.6060102@redhat.com \
--to=fweimer@redhat.com \
--cc=kernel-hardening@lists.openwall.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.