From: Rusty Russell <rusty@rustcorp.com.au>
To: Eric Paris <eparis@redhat.com>
Cc: Alan Jenkins <sourcejedi.lkml@googlemail.com>,
linux-kernel@vger.kernel.org, arjan@infradead.org,
randy.dunlap@oracle.com, andi@firstfloor.org,
dhowells@redhat.com, akpm@linux-foundation.org
Subject: Re: request_module vs. modprobe blacklist (and security subsystem implications)
Date: Fri, 23 Oct 2009 19:46:38 +1030 [thread overview]
Message-ID: <200910231946.39174.rusty@rustcorp.com.au> (raw)
In-Reply-To: <1256221822.4443.95.camel@dhcp231-106.rdu.redhat.com>
On Fri, 23 Oct 2009 01:00:22 am Eric Paris wrote:
> > If a userspace program tries some security exploit that has been closed, do
> > you want to warn about it? Because that seems to be the question here.
>
> I say yes. Knowing that malicious activity is taking place, even if it
> didn't hurt anything is useful.
Hi Eric,
Your proposal is troubling for three reasons:
1) You would disable logging for things you actually want logged.
2) What *actually* happens when ssh tries to load ipv6 is that
"modprobe net-pf-10" gets called.
3) Containing modprobe behavior in one set of config files is really nice.
> > Why should ssh not load IPv6? Because noone should? Fine, but there's a
> > difference between "I expect it to do this but I won't let it" and "I don't
> > expect it to do this".
>
> In this case it's because the admin decided not to allow it. In this
> case it is 'I expect it to do this, and I know that later it would fail,
> so I don't want to complain that it is failing now.' I want a way to
> move the failure up, and to allow and admin to stop with the useless
> userspace callouts to modprobe.
No. I anticipate that in the future you will want to do some fairly
sophisticated filtering. That does not belong in the kernel unless there
are performance concerns, and I don't think there are here.
There are all kinds of things that can be administratively prohibited, and
it would be nice if my security tools would Just Work with that: I don't think
pushing all the different restrictions into the kernel for SELinux's sake
is the way forward.
> I want a way to make the kernel not upcall at all, if I have that I can
> make SELinux do whatever I want. If I don't have that, all I can do is
> some post failure fragile userspace filtering.
If the kernel is better at filtering than userspace, that is an SELinux
problem that you should address.
Cheers,
Rusty.
next prev parent reply other threads:[~2009-10-23 9:16 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-10-21 15:02 request_module vs. modprobe blacklist (and security subsystem implications) Eric Paris
2009-10-21 19:11 ` Alan Jenkins
2009-10-21 19:27 ` Eric Paris
2009-10-21 21:00 ` Alan Jenkins
2009-10-22 5:56 ` Rusty Russell
2009-10-22 14:30 ` Eric Paris
2009-10-23 9:16 ` Rusty Russell [this message]
2009-10-23 14:23 ` Eric Paris
2009-10-23 14:59 ` Rusty Russell
2009-10-22 0:48 ` Andi Kleen
2009-10-22 1:12 ` Eric W. Biederman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200910231946.39174.rusty@rustcorp.com.au \
--to=rusty@rustcorp.com.au \
--cc=akpm@linux-foundation.org \
--cc=andi@firstfloor.org \
--cc=arjan@infradead.org \
--cc=dhowells@redhat.com \
--cc=eparis@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=randy.dunlap@oracle.com \
--cc=sourcejedi.lkml@googlemail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox