netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Dan Rosenberg <drosenberg@vsecurity.com>
To: davem@davemloft.net
Cc: netdev@vger.kernel.org
Subject: Re: [PATCH 4/10] Fix leaking of kernel heap addresses in net/
Date: Sat, 13 Nov 2010 13:42:34 -0500	[thread overview]
Message-ID: <1289673754.3090.362.camel@Dan> (raw)
In-Reply-To: <1289673008.3090.350.camel@Dan>

> Actually, this is not even a joke.
> 
> Take a look at how we track what sockets a user wants dumped via
> the inet_diag netlink facility, the socket pointer is used as
> the identification cookie.
> 
> I'm sure we'll now get some more security theatre about how we
> have to undo that too.
> 
> More and more I see this whole idea as extremely rediculious.
> 
> If I can write to or read kernel memory, I can look up the
> sockets, inodes, and whatever else we're currently exposing
> the addresses of.  Even without a symbol table, which is
> readily available, I can easily find the ksymtab and find the
> inode and socket hash table addresses there.
> 
> This whole exercise is closing the barn door after the horses have
> already escaped, and it's causing all kinds of inconveniences
> that we really have no need for.

Of course if you can both write and read to kernel memory, this is a
pointless exercise, but those are not the conditions I am trying to
defend against.  Proactive security assumes that individual bugs will
continue to be found, and takes steps to prevent exploitation of classes
of bugs on a broader scale.  In this case, the goal is for it to be
difficult to exploit arbitrary write bugs WITHOUT having a separate
arbitrary read bug.  Several other steps are being taken in this
direction - there is open discussion about the merits of hiding symbol
information, address space randomization, marking various likely targets
as read-only, and restricting access to debugging information.  However,
none of this really accomplishes much if addresses are still exposed
via /proc.

I'm sorry that you see all this as "security theatre".  It's clear that
there's too much resistance to this effort for it to ever succeed, so
I'm ceasing attempts to get this patch series through.

-Dan


       reply	other threads:[~2010-11-13 18:43 UTC|newest]

Thread overview: 20+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <1289673008.3090.350.camel@Dan>
2010-11-13 18:42 ` Dan Rosenberg [this message]
2010-11-12  2:15 [PATCH 4/10] Fix leaking of kernel heap addresses in net/ Dan Rosenberg
     [not found] ` <2129857903-1289528127-cardhu_decombobulator_blackberry.rim.net-1506931048--JnVBb1XAImjjL2gL5RxOEzYg3SYOavFBmZ6FRVpaDsI@public.gmane.org>
2010-11-12  2:29   ` David Miller
2010-11-12  2:34     ` Dan Rosenberg
2010-11-12  2:49       ` David Miller
2010-11-12  2:51         ` Dan Rosenberg
2010-11-12  2:59           ` David Miller
2010-11-12  7:23       ` Eric Dumazet
2010-11-12 12:37         ` Dan Rosenberg
2010-11-12 16:33         ` Stephen Hemminger
2010-11-12 17:24           ` Dan Rosenberg
2010-11-12 18:33             ` Stephen Hemminger
2010-11-12 20:18           ` Alexey Dobriyan
2010-11-12 20:37             ` David Miller
2010-11-12 22:40               ` Alexey Dobriyan
2010-11-12 22:46                 ` David Miller
  -- strict thread matches above, loose matches on Subject: below --
2010-11-12  1:07 Dan Rosenberg
2010-11-12  1:10 ` David Miller
2010-11-12  1:20   ` Dan Rosenberg
2010-11-12  2:02     ` David Miller

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1289673754.3090.362.camel@Dan \
    --to=drosenberg@vsecurity.com \
    --cc=davem@davemloft.net \
    --cc=netdev@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).