From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753238AbdK2Ggx (ORCPT ); Wed, 29 Nov 2017 01:36:53 -0500 Received: from imap.thunk.org ([74.207.234.97]:40280 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753121AbdK2Ggu (ORCPT ); Wed, 29 Nov 2017 01:36:50 -0500 Date: Wed, 29 Nov 2017 01:36:39 -0500 From: "Theodore Ts'o" To: Kees Cook Cc: Linus Torvalds , Djalal Harouni , Jonathan Corbet , James Morris , LSM List , Linux Kernel Mailing List , "kernel-hardening@lists.openwall.com" , Geo Kozey , Tycho Andersen Subject: Re: [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules Message-ID: <20171129063639.tuacfa2op6fgj6he@thunk.org> Mail-Followup-To: Theodore Ts'o , Kees Cook , Linus Torvalds , Djalal Harouni , Jonathan Corbet , James Morris , LSM List , Linux Kernel Mailing List , "kernel-hardening@lists.openwall.com" , Geo Kozey , Tycho Andersen References: <20171128193243.4fymnjk7fplqw62x@thunk.org> <20171128232320.22zo324g5wvo2lce@thunk.org> <20171128234920.awfwicihuudw5ogx@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170609 (1.8.3) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@thunk.org X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 28, 2017 at 04:18:59PM -0800, Kees Cook wrote: > There's also a difference between immutable CONFIG options that cannot > be disabled at runtime, those that can, global sysctls, per-namespace > controls, etc etc. The kernel is all about providing admins with knobs > to tweak their performance and security. Suddenly being told that we > can't create optional improvements is very odd. I just think that tweakable knobs are mostly pointless. From my experience the number of sysadmins that adjust knobs is ***tiny***[1]. Put another way, the effort to determine whether tweaking a knob will result in breakages or will be safe is as much work as creating a white list of modules that are allowed to be loaded. [1] And I say that having providing a lot of knobs for ext4. :-) This is why some on the kernel-hardening list have argued for making the default to be opt-out, which means some users will be breaken (and their answer to that seems to be, "oh well --- gotta break some eggs to make an omlette". Sucks if you're one of the eggs, though.) And I don't see how systemd magically means no one will be broken. If you have a non-root process trying to invoke a line discpline which has to be loaded as a module, if you flip the switch, that process will be broken. How does using systemd make the problem go away? - Ted From mboxrd@z Thu Jan 1 00:00:00 1970 From: tytso@mit.edu (Theodore Ts'o) Date: Wed, 29 Nov 2017 01:36:39 -0500 Subject: [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules In-Reply-To: References: <20171128193243.4fymnjk7fplqw62x@thunk.org> <20171128232320.22zo324g5wvo2lce@thunk.org> <20171128234920.awfwicihuudw5ogx@thunk.org> Message-ID: <20171129063639.tuacfa2op6fgj6he@thunk.org> To: linux-security-module@vger.kernel.org List-Id: linux-security-module.vger.kernel.org On Tue, Nov 28, 2017 at 04:18:59PM -0800, Kees Cook wrote: > There's also a difference between immutable CONFIG options that cannot > be disabled at runtime, those that can, global sysctls, per-namespace > controls, etc etc. The kernel is all about providing admins with knobs > to tweak their performance and security. Suddenly being told that we > can't create optional improvements is very odd. I just think that tweakable knobs are mostly pointless. From my experience the number of sysadmins that adjust knobs is ***tiny***[1]. Put another way, the effort to determine whether tweaking a knob will result in breakages or will be safe is as much work as creating a white list of modules that are allowed to be loaded. [1] And I say that having providing a lot of knobs for ext4. :-) This is why some on the kernel-hardening list have argued for making the default to be opt-out, which means some users will be breaken (and their answer to that seems to be, "oh well --- gotta break some eggs to make an omlette". Sucks if you're one of the eggs, though.) And I don't see how systemd magically means no one will be broken. If you have a non-root process trying to invoke a line discpline which has to be loaded as a module, if you flip the switch, that process will be broken. How does using systemd make the problem go away? - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo at vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html From mboxrd@z Thu Jan 1 00:00:00 1970 Date: Wed, 29 Nov 2017 01:36:39 -0500 From: Theodore Ts'o Message-ID: <20171129063639.tuacfa2op6fgj6he@thunk.org> References: <20171128193243.4fymnjk7fplqw62x@thunk.org> <20171128232320.22zo324g5wvo2lce@thunk.org> <20171128234920.awfwicihuudw5ogx@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Subject: Re: [kernel-hardening] Re: [PATCH v5 next 5/5] net: modules: use request_module_cap() to load 'netdev-%s' modules To: Kees Cook Cc: Linus Torvalds , Djalal Harouni , Jonathan Corbet , James Morris , LSM List , Linux Kernel Mailing List , "kernel-hardening@lists.openwall.com" , Geo Kozey , Tycho Andersen List-ID: On Tue, Nov 28, 2017 at 04:18:59PM -0800, Kees Cook wrote: > There's also a difference between immutable CONFIG options that cannot > be disabled at runtime, those that can, global sysctls, per-namespace > controls, etc etc. The kernel is all about providing admins with knobs > to tweak their performance and security. Suddenly being told that we > can't create optional improvements is very odd. I just think that tweakable knobs are mostly pointless. From my experience the number of sysadmins that adjust knobs is ***tiny***[1]. Put another way, the effort to determine whether tweaking a knob will result in breakages or will be safe is as much work as creating a white list of modules that are allowed to be loaded. [1] And I say that having providing a lot of knobs for ext4. :-) This is why some on the kernel-hardening list have argued for making the default to be opt-out, which means some users will be breaken (and their answer to that seems to be, "oh well --- gotta break some eggs to make an omlette". Sucks if you're one of the eggs, though.) And I don't see how systemd magically means no one will be broken. If you have a non-root process trying to invoke a line discpline which has to be loaded as a module, if you flip the switch, that process will be broken. How does using systemd make the problem go away? - Ted