tech-kern archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: RFC: New security model secmodel_securechroot(9)
On Thu, Jul 14, 2011 at 12:07:56AM +0300, Aleksey Cheusov wrote:
> > So what is the security policy you mean to enforce by blocking paths
> > into the kernel with kauth? For every `destructive modification' that
> > can be done to the system, what is every path into the kernel that
> > leads to that modification?
> > Have you blocked all such paths in your kauth secmodel?
>
> I'm open for concrete ideas and references.
I haven't followed the discussion that closely, but the following list appears
in the chroot(2) restrictions of the PaX/Grsecurity (Linux) project:
* No attaching shared memory outside of chroot
* No kill outside of chroot
* No ptrace outside of chroot (architecture independent)
* No capget outside of chroot
* No setpgid outside of chroot
* No getpgid outside of chroot
* No getsid outside of chroot
* No sending of signals by fcntl outside of chroot
* No viewing of any process outside of chroot, even if /proc is mounted
* No mounting or remounting
* No pivot_root
* No double chroot
* No fchdir out of chroot
* Enforced chdir("/") upon chroot
* No (f)chmod +s
* No mknod
* No sysctl writes
* No raising of scheduler priority
* No connecting to abstract unix domain sockets outside of chroot
* Removal of harmful privileges via capabilities
* Exec logging within chroot
- Jukka.
Home |
Main Index |
Thread Index |
Old Index