tech-security archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Relax the prohibition of usage fchdir(2) to quit a chroot
Am 21.09.2014 um 11:37 schrieb Kamil Rytarowski <n54%gmx.com@localhost>:
> Hello Matt,
>
> Thank you for your reply.
>
> I do agree that the rule looks perfectly sane and in inviolate.... however
> there is the second side of it. The fchdir(2) used i.a. in the venerable RPM
> is very ugly, I do agree with it.
>
> The second side of this ugly hack is that it opens the possibilities to
> flawlessly interfere between the native and a chroot environment and make the
> job done immediately -- just enter_chroot() and quit_chroot() and you are
> done, with zero modification to the code-base, zero additional-logic.
> Replacing flawlessly the broken design with something sane produced many and
> different difficult use-cases of RPM features to get implemented - and in the
> end I was enforced to abandon it at that time.
>
> I was trying to raise this issue a year ago at the RPM main mailing-list
> [1]...
>
> Well let's please don't shift this discussion from kernel-security to this or
> that piece of 3rd party software, neither this particular use-case.
>
> My proposition is to add:
>
> security.chroot.allow_fchdir_out_of_chroot = 0
> security.chroot.allow_sysctl_inside_chroot = 1
>
> It's not broken by a 'the right design', but stops the job from being done.
>
> It passed a year after coming to conclusion how to walk-around it... fix the
> kernel.
There is nothing to fix in the kernel in this regard.
that said, I think you can stop insisting, it will not happen, imo...
Home |
Main Index |
Thread Index |
Old Index