From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from list by lists.gnu.org with archive (Exim 4.71) id 1Vr9SY-0004Dt-EM for mharc-grub-devel@gnu.org; Thu, 12 Dec 2013 11:49:58 -0500 Received: from eggs.gnu.org ([2001:4830:134:3::10]:59534) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Vr9SU-0004BU-H1 for grub-devel@gnu.org; Thu, 12 Dec 2013 11:49:55 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1Vr9ST-0005IK-4C for grub-devel@gnu.org; Thu, 12 Dec 2013 11:49:54 -0500 Received: from mail-wi0-x230.google.com ([2a00:1450:400c:c05::230]:57379) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1Vr9SS-0005ID-P8 for grub-devel@gnu.org; Thu, 12 Dec 2013 11:49:53 -0500 Received: by mail-wi0-f176.google.com with SMTP id hq4so8990498wib.3 for ; Thu, 12 Dec 2013 08:49:51 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=18BMCbUVpNkYSLCnBNpKfGZYJZEjuaxXkktQ+U/VR+w=; b=riJRVVCsobJgHq2PrLHSJcBANIprTFP0jgTMV/DORf5tzFVqL+aewCk0pFkoM0cYBP RKun8k6fUxC6C//Cf/Q1isLd5Q1ZeHBVwUfbVABhoOqj54RLhzHwSLN/WxWrH1Xvquab Jt94LzfS1H4b2AkG2e6bW14c8gClT5DvP64D62o0sce/CnoKXqriIic/GDIg1fersVWV scJQqOecIton4R5Vs7dwq4elxJwtFxwSR/C9RFNXmzQqFmype2lMutVCwfos34nDthG5 4sohwifIKmy+XG3CGJioINqlwSZDnUrEqvSy0ll6oBbsyFjyXqPSYbK+VGda8V1BWV5u 68PQ== MIME-Version: 1.0 X-Received: by 10.180.14.134 with SMTP id p6mr30026621wic.6.1386866991776; Thu, 12 Dec 2013 08:49:51 -0800 (PST) Received: by 10.180.39.193 with HTTP; Thu, 12 Dec 2013 08:49:51 -0800 (PST) Received: by 10.180.39.193 with HTTP; Thu, 12 Dec 2013 08:49:51 -0800 (PST) In-Reply-To: References: <20131212153643.GA1431@riva.ucam.org> <20131212153741.GD1431@riva.ucam.org> <20131212163907.GG1431@riva.ucam.org> Date: Thu, 12 Dec 2013 17:49:51 +0100 Message-ID: Subject: Fwd: Re: [PATCH 3/4] Build grub.xen. From: "Vladimir 'phcoder' Serbinenko" To: xen-devel , development of GRUB 2 Content-Type: multipart/alternative; boundary=f46d04155418654aae04ed5922a4 X-detected-operating-system: by eggs.gnu.org: Error: Malformed IPv6 address (bad octet value). X-Received-From: 2a00:1450:400c:c05::230 X-BeenThere: grub-devel@gnu.org X-Mailman-Version: 2.1.14 Precedence: list Reply-To: The development of GNU GRUB List-Id: The development of GNU GRUB List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 12 Dec 2013 16:49:56 -0000 --f46d04155418654aae04ed5922a4 Content-Type: text/plain; charset=ISO-8859-1 ---------- Forwarded message ---------- From: "Vladimir 'phcoder' Serbinenko" Date: Dec 12, 2013 5:45 PM Subject: Re: [PATCH 3/4] Build grub.xen. To: "The development of GNU GRUB" No I meant full access to just obe of guest partitions. E.g. FTP may be using separate partition and non-admins may have control over it. If system has some kind of automatic user creation and /home is separate someone may register as boot or grub and put grub.xen in his directory. If /tmp is on separate partition and not in RAM then everybody can put grub.xen to /tmp/grub/grub.xen On Dec 12, 2013 5:39 PM, "Colin Watson" wrote: > On Thu, Dec 12, 2013 at 05:24:50PM +0100, Vladimir 'phcoder' Serbinenko > wrote: > > This config has a security problem. If a user has full acces to some > > partition (e.g. fto server partition) he can put grub.xen there and load > > his own code > > Only in the domU context, though. If a user has full access to a guest > filesystem then of course they can run code in the domU. This seems > unsurprising and not a problem? > > -- > Colin Watson [cjwatson@ubuntu.com] > > _______________________________________________ > Grub-devel mailing list > Grub-devel@gnu.org > https://lists.gnu.org/mailman/listinfo/grub-devel > --f46d04155418654aae04ed5922a4 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
---------- Forwarded message ----------
From:= "Vladimir 'phcoder' Serbinenko" <phcoder@gmail.com>
Date: Dec 12, 2013 5:45 PM Subject: Re: [PATCH 3/4] Build grub.xen.
To: "The development of GN= U GRUB" <grub-devel@gnu.org>

No I meant full access to just obe of= guest partitions. E.g. FTP may be using separate partition and non-admins = may have control over it. If system has some kind of automatic user creatio= n and /home is separate someone may register as boot or grub and put grub.x= en in his directory. If /tmp is on separate partition and not in RAM then e= verybody can put grub.xen to /tmp/grub/grub.xen

On Dec 12, 2013 5:39 PM, "Colin Watson"= ; <cjwatson@ubu= ntu.com> wrote:
On Thu, Dec 12, 2013 at 05:24:50PM +0100, Vladimir 'phcoder' Serbin= enko wrote:
> This config has a security problem. If a user has full acces to some > partition (e.g. fto server partition) he can put grub.xen there and lo= ad
> his own code

Only in the domU context, though. =A0If a user has full access to a guest filesystem then of course they can run code in the domU. =A0This seems
unsurprising and not a problem?

--
Colin Watson =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 = =A0 =A0 =A0 =A0 [c= jwatson@ubuntu.com]

_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org<= /a>
https://lists.gnu.org/mailman/listinfo/grub-devel
--f46d04155418654aae04ed5922a4--