public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: "Lorenzo Hernández García-Hierro" <lorenzo@gnu.org>
To: Felipe Alfaro Solana <lkml@mac.com>
Cc: narahimi@us.ibm.com, Chris Wright <chrisw@osdl.org>,
	linux-kernel@vger.kernel.org, linux-security-module@wirex.com
Subject: Re: [PATCH] Enhanced Trusted Path Execution (TPE) Linux Security	Module
Date: Thu, 06 Jan 2005 19:04:36 +0100	[thread overview]
Message-ID: <1105034676.4028.77.camel@localhost.localdomain> (raw)
In-Reply-To: <EA341136-600C-11D9-892F-000D9352858E@mac.com>

[-- Attachment #1: Type: text/plain, Size: 1312 bytes --]

Hi Felipe,

El jue, 06-01-2005 a las 19:00 +0100, Felipe Alfaro Solana escribió:
> On 6 Jan 2005, at 15:50, Lorenzo Hernández García-Hierro wrote:
> 
> >> The two biggest issues are 1) it's trivial to bypass:
> >> $ /lib/ld.so /untrusted/path/to/program
> >> and 2) that there's no (visible/vocal) user base calling for the 
> >> feature.
> >
> > About the point 1), yesterday i wrote just a simple regression test
> > (that can be found at the same place as the patch) and of course it
> > bypasses, this is an old commented problem, Stephen suggested the use 
> > of
> > the mmap and mprotect hooks, so, i will have a look at them but i'm not
> > sure on how to (really) prevent the dirty,old trick.
> > About 2), just give it a chance, maybe it's useful and my work is not
> > completely nonsense.
> 
> Well, I'm not a visible/vocal user base, but I do really like this TPE 
> LSM module.

Thanks :)
I hope you will like much more the revision i'm coding right now.
Tonight, my queue is a bit overloaded, i need to fix some things in the
SELinux 2.4 backport, but i hope i will finish it today as it doesn't
require a lot of time.

Cheers,
-- 
Lorenzo Hernández García-Hierro <lorenzo@gnu.org> [1024D/6F2B2DEC]
[2048g/9AE91A22] Hardened Debian head developer & project manager

[-- Attachment #2: Esta parte del mensaje está firmada digitalmente --]
[-- Type: application/pgp-signature, Size: 189 bytes --]

      reply	other threads:[~2005-01-06 18:13 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-01-06  2:51 [PATCH] Enhanced Trusted Path Execution (TPE) Linux Security Module Lorenzo Hernández García-Hierro
2005-01-06  5:26 ` Chris Wright
2005-01-06 14:50   ` Lorenzo Hernández García-Hierro
2005-01-06 18:00     ` Felipe Alfaro Solana
2005-01-06 18:04       ` Lorenzo Hernández García-Hierro [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1105034676.4028.77.camel@localhost.localdomain \
    --to=lorenzo@gnu.org \
    --cc=chrisw@osdl.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@wirex.com \
    --cc=lkml@mac.com \
    --cc=narahimi@us.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox