From: "Paul E. McKenney" <paulmck@linux.vnet.ibm.com>
To: Richard Weinberger <richard@nod.at>
Cc: Richard Weinberger <richard.weinberger@gmail.com>,
Josh Triplett <josh@joshtriplett.org>,
Casey Schaufler <casey@schaufler-ca.com>,
Iulia Manda <iulia.manda21@gmail.com>,
One Thousand Gnomes <gnomes@lxorguk.ukuu.org.uk>,
Serge Hallyn <serge.hallyn@canonical.com>,
LKML <linux-kernel@vger.kernel.org>,
Andrew Morton <akpm@linux-foundation.org>,
Peter Zijlstra <peterz@infradead.org>,
Michal Hocko <mhocko@suse.cz>,
LSM <linux-security-module@vger.kernel.org>
Subject: Re: [PATCH v2] kernel: Conditionally support non-root users, groups and capabilities
Date: Sun, 1 Feb 2015 11:45:08 -0800 [thread overview]
Message-ID: <20150201194508.GA19109@linux.vnet.ibm.com> (raw)
In-Reply-To: <54CD6643.2060504@nod.at>
On Sun, Feb 01, 2015 at 12:33:23AM +0100, Richard Weinberger wrote:
> Am 01.02.2015 um 00:30 schrieb Paul E. McKenney:
> > On Fri, Jan 30, 2015 at 10:56:14PM +0100, Richard Weinberger wrote:
> >> On Fri, Jan 30, 2015 at 10:40 PM, Josh Triplett <josh@joshtriplett.org> wrote:
> >>> *Today*, Linux is a challenging choice for a tiny embedded system.
> >>> We're trying to fix that.
> >>
> >> Can you please more specific about the embedded systems exactly you're
> >> talking about?
> >>
> >> I find this patch rather controversial as it removes a lot of security.
> >> Embedded systems *are* a target for all kind of attacks.
> >> Misguided embedded engineers will abuse this feature and produce even more
> >> weak targets.
> >
> > Without this patch, those same engineers would simply run everything as
> > root. "Make a foolproof system, and they will invent a better fool". ;-)
>
> Luckily many services will run as non-root by default and some even refuse to
> run as root. :-)
Here is hoping that this helps those engineers to use a decent security
model for their devices! ;-)
Thanx, Paul
next prev parent reply other threads:[~2015-02-01 19:45 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-01-29 18:43 [PATCH v2] kernel: Conditionally support non-root users, groups and capabilities Iulia Manda
2015-01-29 18:59 ` Geert Uytterhoeven
2015-01-29 20:01 ` josh
2015-01-29 20:16 ` Geert Uytterhoeven
2015-01-29 23:44 ` Casey Schaufler
2015-01-30 0:32 ` Paul E. McKenney
2015-01-30 1:25 ` Casey Schaufler
2015-01-30 1:36 ` Paul E. McKenney
2015-01-30 2:25 ` Casey Schaufler
2015-01-30 7:07 ` Paul E. McKenney
2015-01-30 19:13 ` josh
2015-01-30 19:48 ` Casey Schaufler
2015-01-30 20:20 ` Austin S Hemmelgarn
2015-01-30 21:40 ` Josh Triplett
2015-01-30 21:56 ` Richard Weinberger
2015-01-31 23:30 ` Paul E. McKenney
2015-01-31 23:33 ` Richard Weinberger
2015-02-01 19:45 ` Paul E. McKenney [this message]
2015-01-31 17:00 ` Jarkko Sakkinen
2015-01-30 0:43 ` josh
2015-01-30 2:05 ` Casey Schaufler
2015-01-30 21:04 ` Josh Triplett
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20150201194508.GA19109@linux.vnet.ibm.com \
--to=paulmck@linux.vnet.ibm.com \
--cc=akpm@linux-foundation.org \
--cc=casey@schaufler-ca.com \
--cc=gnomes@lxorguk.ukuu.org.uk \
--cc=iulia.manda21@gmail.com \
--cc=josh@joshtriplett.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=mhocko@suse.cz \
--cc=peterz@infradead.org \
--cc=richard.weinberger@gmail.com \
--cc=richard@nod.at \
--cc=serge.hallyn@canonical.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox