From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Serge E. Hallyn" Subject: Re: RFC: disablenetwork facility. (v4) Date: Wed, 30 Dec 2009 12:00:45 -0600 Message-ID: <20091230180045.GA14493@us.ibm.com> References: <20091229151146.GA32153@us.ibm.com> <3e8340490912290805s103fb789y13acea4a84669b20@mail.gmail.com> <20091229211139.0732a0c1@lxorguk.ukuu.org.uk> <20091229223631.GB22578@us.ibm.com> <20091230035008.GA6819@us.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Alan Cox , Benny Amorsen , Bryan Donlan , Michael Stone , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-security-module@vger.kernel.org, Andi Kleen , David Lang , Oliver Hartkopp , Herbert Xu , Valdis Kletnieks , Evgeniy Polyakov , "C. Scott Ananian" , James Morris , Bernie Innocenti , Mark Seaborn , Randy Dunlap , =?iso-8859-1?Q?Am=E9rico?= Wang , Tetsuo Handa , Samir Bellabes , Casey Schaufler , Pavel Machek , Al V To: "Eric W. Biederman" Return-path: Content-Disposition: inline In-Reply-To: Sender: linux-security-module-owner@vger.kernel.org List-Id: netdev.vger.kernel.org Quoting Eric W. Biederman (ebiederm@xmission.com): > "Serge E. Hallyn" writes: > > >> In common cap we drop the new capabilities if we are being ptraced. > >> Look for brm->unsafe. > > > > Yes - that isn't the issue. > > Right. Sorry. I saw that we set unsafe and totally > missed that we don't act on it in that case. > > > It goes back to finding a way to figure out what is inside the > > file when the installer obviously thought we shouldn't be able > > to read the file. > > > > Do we care? > > > > I expect two lines of testing bprm->unsafe and failing > at the right point would solve that. But what is the right response? Prevent excecution? Stop the tracer? Enter some one-shot mode where the whole exec appears as one step, but tracing continues if execution continues on a dumpable file? -serge