A crypto (secure voice) app I am testing fails to start - it is trying to read 
/dev/random:
<5>[ 2951.029571] type=1400 audit(1359410942.187:32): avc:  denied  { read } for
  pid=2435 comm=4173796E635461736B202331 name="random" dev=tmpfs ino=4012 
scontext=u:r:untrusted_app:s0:c50,c256 tcontext=u:object_r:random_device:s0 
tclass=chr_file

Would it be reasonable to add a "allow domain random_device:chr_file 
r_file_perms;" rule to allow all apps to read /dev/random?

I think the main threat is that a malicious app could potentially keep reading 
from /dev/random and use up the entropy pool (preventing others from reading 
/dev/random).

Some might say the app should use /dev/urandom instead.  At which time others 
would probably then complain that /dev/urandom is "not good enough".  Not sure 
that I personally want to take sides on /dev/random vs. /dev/urandom. :)

--
Michael Peck
The MITRE Corporation

Reply via email to