From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ingo Molnar Subject: Re: [PATCH v2012.2] fs: symlink restrictions on sticky directories Date: Sun, 19 Feb 2012 13:31:51 +0100 Message-ID: <20120219123151.GA25900@elte.hu> References: <20120107185548.GA30748@outflux.net> <20120217152432.112fdace.akpm@linux-foundation.org> <20120217154213.ecf4f7b4.akpm@linux-foundation.org> Reply-To: kernel-hardening@lists.openwall.com Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Andrew Morton , linux-kernel@vger.kernel.org, Alexander Viro , Rik van Riel , Federica Teodori , Lucian Adrian Grijincu , Peter Zijlstra , Eric Paris , Randy Dunlap , Dan Rosenberg , linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, kernel-hardening@lists.openwall.com To: Kees Cook Return-path: List-Post: List-Help: List-Unsubscribe: List-Subscribe: Content-Disposition: inline In-Reply-To: List-Id: linux-fsdevel.vger.kernel.org * Kees Cook wrote: > >> > I think I disagree with this. __If the person compiling > >> > the kernel includes the feature in his kernel via the > >> > time-honoured process of "wtf is that thing? __Yeah, > >> > whatev", it gets turned on by default. __This could > >> > easily result in weird failures which would take a *long* > >> > time for an unsuspecting person to debug. > >> > > >> > Would it not be kinder to our users to start this out as > >> > turned-off-at-runtime unless the kernel configurer has > >> > deliberately gone in and enabled it? > >> > >> There was a fair bit of back-and-forth discussion about it. > >> Originally, I had it disabled, but, IIRC, Ingo urged me to > >> have it be the default. I can sent a patch to disable it if > >> you want. > > > > What is the reasoning behind the current setting? > > The logic is currently: > > - from a security perspective, enabling the restriction is > safer > - in the last many years, nothing has been found to be > broken by this restriction > > The evidence for the second part mostly comes from people's > recollections using OpenWall, grsecurity, and lately Ubuntu. I > can speak from the Ubuntu history, which is that in the 1.5 > years the symlink restriction has been enabled, no bugs about > it were reported that I'm aware of (and I was aware of, and > fixed, several of bugs in the other restrictions that are > carried in Ubuntu). I'd say all this current evidence suggests that it should be on by default - having it off only helps attackers and hermite systems. So at minimum we should wait until the first regression report before twiddling it off. I could be wrong though. Thanks, Ingo