public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* TIOCCONS security revisited
@ 2006-01-30 13:31 Julian Bradfield
  2006-02-01 15:49 ` Jan Engelhardt
  2006-02-01 17:26 ` Olaf Dabrunz
  0 siblings, 2 replies; 5+ messages in thread
From: Julian Bradfield @ 2006-01-30 13:31 UTC (permalink / raw)
  To: linux-kernel; +Cc: od, lhofhansl

In August 2004, Olaf Dabrunz posted a patch, which appears to have got
into 2.6.10, restricting TIOC_CONS to CAP_SYS_ADMIN .

He justified this by claiming that normal users don't need to grab the
console output.

I disagree. Normal users log into the desktop of their machine, and
should expect to be able to see the console output just as much as if
they logged into "the console" and worked without graphics.
For example, I want to know when the machine I'm working on has
problems, when somebody is probing sshd, and simply when one of my
batch jobs wants to tell me something.

Further, on our systems, I own the console (ownership is transferred
to the user by the login procedure), so it's daft that I can't call TIOCCONS
on it.

I propose that a better security test would be:
user owns /dev/console OR has CAP_SYS_ADMIN .

It should then be the responsibility of the log-out procedure to
cancel redirections when it changes the ownership of devices back to
root.

In December '04, Lars posted about this breakage, and proposed a
simpler patch, allowing general TIOCCONS but restricting cancellation
(as per documentation), but I didn't see anything happen to this.

Any comments? If none, I'll propose a patch.

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2006-02-01 23:59 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-01-30 13:31 TIOCCONS security revisited Julian Bradfield
2006-02-01 15:49 ` Jan Engelhardt
2006-02-01 17:26 ` Olaf Dabrunz
2006-02-01 20:24   ` Julian Bradfield
2006-02-01 23:58     ` Olaf Dabrunz

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox