Andrea Barisani wrote:
<snip>

*sigh*

I thought that this flamewar was dead. Ok, I kindly ask a hardened team
review of this since I strongly believe this is not an issue, systrace is
*not* a broken security model and yes it allows *controlled* privilege
escalation if you configure it that way for removing the setuid but on some
binaries.
This is no flamewar. The model is broken by my standards. It bypasses built-in DAC and capabilities in the kernel making it the single attack vector to gain all access on the system. Compare to grsecurity, rsbac, selinux which do not bypass kernel access control or escalate privileges.

Further, the "lets ask the user if they want to allow this" is inherently flawed. It is a discretionary model, the policy is in no way analyzable. I suggest you read these articles:
http://securityblog.org/brindle/2006/03/25/security-anti-pattern-status-quo-encapsulation/
http://securityblog.org/brindle/2006/04/19/security-anti-pattern-path-based-access-control/

If you have an argument to make please show me the technical details about it
and let's discuss it.

It's *not* part of hardened atm anyway and it won't be unless the hardened
team accepts it. It will remain in the portage tree as long as I support it
unless you show me a clear demonstration of your concerns.
First it will never be accepted by hardened. Second, I believe that security critical packages (particularly access control systems) should go through hardened. Random developers *should not* be putting access control mechanisms in the tree, users will have security expectations that they cannot meet.
BTW even with your concern the ptrace method (which can be entirely tested
userspace) is still useful for debugging/testing, hence the userspace package
has no reason for going away.
As long as its clearly marked as a debugging tool and not as a security tool.
CC'ing systrace author btw (not subscribed to this list)

Great.
--
[email protected] mailing list

Reply via email to