All of lore.kernel.org
 help / color / mirror / Atom feed
From: guido@trentalancia.net (Guido Trentalancia)
To: refpolicy@oss.tresys.com
Subject: [refpolicy] [PATCH 2/2] system/modutils: Allow kmod to use the sys_admin cap
Date: Mon, 28 Nov 2016 23:24:10 +0100	[thread overview]
Message-ID: <1480371850.14631.21.camel@trentalancia.net> (raw)
In-Reply-To: <20161128231432.22c0b1bc@gentp.lnet>

On Sun, 28/11/2016 at 23.14 +0100, Luis Ressel wrote:
> On Mon, 28 Nov 2016 22:57:40 +0100
> Guido Trentalancia via refpolicy <refpolicy@oss.tresys.com> wrote:
> 
> > 
> > That's really?counterproductive when combined with SELinux !
> > 
> > At the moment, if a malicious version of getty gets into the
> > system,
> > it is granted sys_admin capability permissions (which includes
> > privileged and administrative operations).
> > 
> > On the other hand, a normal, tight policy (which does not grant the
> > unneeded sys_admin permission) would prevent a malicious getty from
> > carrying out privileged and administrative operations which can
> > damage
> > the system and/or disrupt its normal operation.
> 
> Well, a malicious binary tagged getty_t and running with root
> privileges could easily wreak enough havoc that the availability or
> non-availability of CAP_SYS_ADMIN access is somewhat irrelevant.
> 
> Anyway, I've just revisited the discussion about agetty's
> cap_sys_admin
> permission we've had in March. Looks like it may be required on some
> non-grsec systems, too. (Grep the ML history for the subject "Allow
> getty the sys_admin capability").

It's very easy !...

You can create a patch that reverts
commit?7216d000d94342dc347a976a7a6a65f40a2f41cb and then adds an "ifdef
grsecurity" for such sys_admin permission (for getty and/or kmod).

That way, it won't unnecessarily weaken other systems.

Regards,

Guido

  reply	other threads:[~2016-11-28 22:24 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-11-27 16:41 [refpolicy] [PATCH 1/2] system/modutils: Add kernel_search_key(kmod_t) Luis Ressel
2016-11-27 16:41 ` [refpolicy] [PATCH 2/2] system/modutils: Allow kmod to use the sys_admin cap Luis Ressel
2016-11-27 20:33   ` Guido Trentalancia
2016-11-27 21:22     ` Luis Ressel
2016-11-27 21:55       ` Luis Ressel
2016-11-27 22:30       ` Luis Ressel
2016-11-27 22:31       ` Guido Trentalancia
2016-11-27 22:50         ` Luis Ressel
2016-11-28 17:02           ` Guido Trentalancia
2016-11-28 21:48             ` Luis Ressel
2016-11-28 21:57               ` Guido Trentalancia
2016-11-28 22:14                 ` Luis Ressel
2016-11-28 22:24                   ` Guido Trentalancia [this message]
2016-11-28 23:03                     ` Luis Ressel
2016-11-28 23:16                       ` Guido Trentalancia
2016-11-29  1:55                         ` Chris PeBenito
2016-11-29  6:22                           ` Nicolas Iooss
2016-11-29 12:53                             ` [refpolicy] [PATCH] Allow getty the sys_admin capability (was Re: [PATCH 2/2] system/modutils: Allow kmod to use the sys_admin cap) Guido Trentalancia
2016-11-28 22:03             ` [refpolicy] [PATCH 2/2] system/modutils: Allow kmod to use the sys_admin cap Luis Ressel
2016-11-28 22:08               ` Guido Trentalancia
2016-12-04 23:56 ` [refpolicy] [PATCH 1/2] system/modutils: Add kernel_search_key(kmod_t) Luis Ressel
2016-12-07  0:59 ` Chris PeBenito

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1480371850.14631.21.camel@trentalancia.net \
    --to=guido@trentalancia.net \
    --cc=refpolicy@oss.tresys.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.