From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754849AbbAaXda (ORCPT ); Sat, 31 Jan 2015 18:33:30 -0500 Received: from a.ns.miles-group.at ([95.130.255.143]:65276 "EHLO radon.swed.at" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754011AbbAaXd2 (ORCPT ); Sat, 31 Jan 2015 18:33:28 -0500 Message-ID: <54CD6643.2060504@nod.at> Date: Sun, 01 Feb 2015 00:33:23 +0100 From: Richard Weinberger User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0 MIME-Version: 1.0 To: paulmck@linux.vnet.ibm.com, Richard Weinberger CC: Josh Triplett , Casey Schaufler , Iulia Manda , One Thousand Gnomes , Serge Hallyn , LKML , Andrew Morton , Peter Zijlstra , Michal Hocko , LSM Subject: Re: [PATCH v2] kernel: Conditionally support non-root users, groups and capabilities References: <20150129184311.GA6404@winterfell> <54CAC5EE.8060107@schaufler-ca.com> <20150130003228.GJ19109@linux.vnet.ibm.com> <54CADDA4.4040602@schaufler-ca.com> <20150130013600.GM19109@linux.vnet.ibm.com> <54CAEB93.5090508@schaufler-ca.com> <20150130191302.GA19744@cloud> <54CBDFF4.1070503@schaufler-ca.com> <20150130214007.GA2613@jtriplet-mobl1> <20150131233021.GZ19109@linux.vnet.ibm.com> In-Reply-To: <20150131233021.GZ19109@linux.vnet.ibm.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am 01.02.2015 um 00:30 schrieb Paul E. McKenney: > On Fri, Jan 30, 2015 at 10:56:14PM +0100, Richard Weinberger wrote: >> On Fri, Jan 30, 2015 at 10:40 PM, Josh Triplett wrote: >>> *Today*, Linux is a challenging choice for a tiny embedded system. >>> We're trying to fix that. >> >> Can you please more specific about the embedded systems exactly you're >> talking about? >> >> I find this patch rather controversial as it removes a lot of security. >> Embedded systems *are* a target for all kind of attacks. >> Misguided embedded engineers will abuse this feature and produce even more >> weak targets. > > Without this patch, those same engineers would simply run everything as > root. "Make a foolproof system, and they will invent a better fool". ;-) Luckily many services will run as non-root by default and some even refuse to run as root. :-) Thanks, //richard