From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steve Grubb Subject: Re: [PATCH v2] sanitize task->comm to avoid leaking escape codes Date: Tue, 29 Jun 2010 20:22:52 -0400 Message-ID: <201006292022.53834.sgrubb@redhat.com> References: <20100629115957.38BF.A69D9226@jp.fujitsu.com> <201006290858.50387.sgrubb@redhat.com> <20100630084217.38F2.A69D9226@jp.fujitsu.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Cc: Stefani Seibold , Kees Cook , linux-kernel@vger.kernel.org, "Greg Kroah-Hartman" , Andrew Morton , Tejun Heo , Veaceslav Falico , Alexander Viro , Oleg Nesterov , Neil Horman , Roland McGrath , Ingo Molnar , Peter Zijlstra , Hidetoshi Seto , Thomas Gleixner , Eric Paris , James Morris , "Andrew G. Morgan" , Dhaval Giani , "Serge E. Hallyn" , Christoph Hellwig , linux-fsdevel@vger.kernel.org To: KOSAKI Motohiro Return-path: In-Reply-To: <20100630084217.38F2.A69D9226@jp.fujitsu.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org On Tuesday, June 29, 2010 08:16:08 pm KOSAKI Motohiro wrote: > > For the audit system, we want the real, unsanitized task->comm. We record > > it in a special format to the audit logs such that unprintable > > characters are included. We want it exactly this way for certification > > purposes as well as forensic evidence if someone was playing games. If > > you do sanitize it for other areas of the kernel, please give us a way > > to get the unsanitized text. > > Probably this mail is offtopic. I think audit is unrelated with this > discusstion. because when forensic, admins shouldn't believe task->comm > at all. because 1) no path information, perhaps "ls" might mean > "/home/attackers-dir/evil-script/ls" 2) easily obscured by > prctl(PR_SET_NAME). No, its on-topic and we want that information unchanged. > That said, audit have to logged following two point if task name is > necessary. 1) exec > 2) prctl(PRT_SET_NAME) > > Thought ? The audit system is capable of grabbing that information, too. -Steve