From: mp.lists@free.fr
To: util-linux <util-linux@vger.kernel.org>
Cc: Karel Zak <kzak@redhat.com>
Subject: Re: Accessibility of swap files
Date: Fri, 07 Dec 2012 20:14:34 +0100 [thread overview]
Message-ID: <1354907674.50c2401a5ee19@imp.free.fr> (raw)
Karel Zak <kzak@...> writes:
>
> On Tue, Nov 06, 2012 at 05:25:02PM +0100, Bernhard Voelker wrote:
> > On November 6, 2012 at 4:06 PM mp.lists@... wrote:
> > > Hi *,
> > >
> > > I think, measures can|should be taken, which reduce the probability of
having
> > > a
> > > swap file inadvertently run with too open permissions.
>
> well, you need root permissions to use swapon, the swap devices and
> files are defined in /etc/fstan which is writable by root only.
>
Very often "root" is a human.
> I have doubts that we have to make the system so paranoid and
> resistant to admin's bugs. And if you really need this level of
> paranoia then use SELinux (or so) rather than expect hardcoded rules
> in swapon(8).
>
Let me say it more liberally:
I expect a POSIXoid system in its default status to be configured the paranoid
way. Everything else shall be an explicit informed decision.
I don't care, how paranoia is implemented, but it has to be omnipresent to a
reasonable degree. If not, we may [in the best case] achieve correctness in a
mathematical sense, but never practically.
> > > As a first idea, it looks, as if such may be implemented, eg. by
> > > letting swapon [and fstab-based "mounting"] by default not enable a
swap
> > > file, if it has non-root access permissions
> >
> > Did you know?
> > The swapon utility issues a warning diagnostic with --verbose:
> >
> > # ls -l /tmp/swapfile
> > -rw-r--r-- 1 berny users 134217728 Nov 6 17:03 /tmp/swapfile
> >
> > # sbin/swapon -v /tmp/swapfile
> > swapon /tmp/swapfile
> > swapon: /tmp/swapfile: insecure permissions 0644, 0600 suggested.
> > swapon: /tmp/swapfile: insecure file owner 1000, 0 (root) suggested.
> > swapon: /tmp/swapfile: found swap signature: version 1, page-size 4, same
byte
> > order
> > swapon: /tmp/swapfile: pagesize=4096, swapsize=134217728,
devsize=134217728
>
> this waring is there since year 1999.. so it's really nothing new.
>
> > BTW: the check for the owner has been added in 2.19
> > (in commit v2.18-88-g306c1df).
> >
> > I don't know if refusing to swapon insecure swap files is a good
> > idea (see below).
> >
> > > || letting mkswap by default ignore too open settings of umask and
create
> > > the
> > > swap file mod 0600 instead.
>
> sorry, this is nonsense
>
You are right.
> > You don't need root privs to run mkswap. Furthermore, mkswap
> > doesn't create the swap file (in terms of calling creat()).
>
> yep, you can use cp(1) or dd(1) to create the file as a copy...
>
> > Instead, it just writes to it.
> > Nevertheless, I think a warning would be enough/nice at this stage.
> >
> > > In both cases, an explicit switch|parameter could enable the present,
> > > non-restrictive behaviour.
> >
> > Changing behavior is not always a good idea for compatibility reasons,
> > and therefore deserves *good* arguments.
>
> Yes, I don't see good arguments.
>
See my next posting.
{In order to get the right balance, I think, its a good idea to have a look at
those well-known systems, which are built on the policy of compatibility... }
Best, Markus
next reply other threads:[~2012-12-07 19:14 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-12-07 19:14 mp.lists [this message]
2013-01-08 12:19 ` Accessibility of swap files Karel Zak
-- strict thread matches above, loose matches on Subject: below --
2012-12-07 19:18 mp.lists
2012-11-06 15:06 mp.lists
2012-11-06 16:25 ` Bernhard Voelker
2012-11-21 10:08 ` Karel Zak
2012-11-21 13:46 ` Sami Kerola
2012-11-21 15:00 ` Karel Zak
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1354907674.50c2401a5ee19@imp.free.fr \
--to=mp.lists@free.fr \
--cc=kzak@redhat.com \
--cc=util-linux@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).