public inbox for kernel-hardening@lists.openwall.com
 help / color / mirror / Atom feed
From: Vasiliy Kulikov <segoon@openwall.com>
To: kernel-hardening@lists.openwall.com
Subject: [kernel-hardening] HARDEN_VM86
Date: Tue, 14 Jun 2011 12:35:59 +0400	[thread overview]
Message-ID: <20110614083559.GB7973@albatros> (raw)

Solar, all -

While actual implementation of CONFIG_HARDEN_VM86 is trivial, the most
important part of pushing the feature into upstream is clarifying to
what security domain vm86(2)/vm86old(2) should be restricted.  In -ow
and -grsecurity it is restricted to CAP_SYS_RAWIO.

I see 3 possibilities:

1) Restrict it to CAP_SYS_RAWIO and make it configurable via sysctl
kernel.vm86_restricted.  0 means current behaviour, 1 means
CAP_SYS_RAWIO-only.

2) The same as (1), but CAP_SYS_ADMIN.

3) Restrict it to some group or CAP_SYS_ADMIN, configurable via
kernel.vm86_group_allowed.  As vm86 is a rarely used thing, group range
makes little sense for me.  0 means root only, -1 means current
behaviour, X>0 means group X.



For people not familiar with CONFIG_HARDEN_VM86:

CONFIG_HARDEN_VM86
  On x86 processors, the Virtual 8086 (VM86) mode allows the execution
  of real mode operating systems and applications (primarily DOS) under
  protected mode operating systems such as Linux (with dosemu).  This
  requires support from the kernel.  Although the amount of kernel code
  needed to support the VM86 mode is small and no security problems
  with it are currently known, that code is unused on most Linux systems
  and as such it poses an unreasonable risk.  This option restricts
  access to system calls used to enter the VM86 mode to processes that
  possess the CAP_SYS_RAWIO capability.  The effect is that any potential
  security bugs in the VM86 mode support code are neutralized.


Thanks,

-- 
Vasiliy

             reply	other threads:[~2011-06-14  8:35 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-06-14  8:35 Vasiliy Kulikov [this message]
2011-06-15 14:38 ` [kernel-hardening] HARDEN_VM86 Solar Designer
2011-06-15 15:38   ` Vasiliy Kulikov
2011-06-16 14:26     ` Vasiliy Kulikov
2011-06-19 14:12   ` Vasiliy Kulikov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20110614083559.GB7973@albatros \
    --to=segoon@openwall.com \
    --cc=kernel-hardening@lists.openwall.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox