Re: [PATCH 0/2] Yama: add PTRACE exception tracking

From: Serge E. Hallyn
Date: Thu Jul 01 2010 - 09:19:57 EST


Quoting Kees Cook (kees.cook@xxxxxxxxxxxxx):
> > This is getting more complicated, with fine-grained security policy now
> > being introduced, also with the need to modify applications.
>
> Well, I'm trying to solve what I think is a core problem with PTRACE -- it
> is too permissive. I'm happy to look at it from other angles if it doesn't
> make sense for this kind of thing to live in Yama. I'm already very happy
> with the existing restrictions available in Yama.

I've been jumping from one conviction to another to yet another and back
again on this.

First off, if you consider PTRACE_PTRACEME, and just consider this a more
finegrained targeted version of that, it doesn't seem all that gross. So
maybe that's my fault for suggesting prctl as an easier-to-use in LSMs
api, bc using a PTRACE_PTRACEDBY might just look cleaner.

Still, you say 'ptrace is too permissive', but a rebuttal to that is that,
in a DAC system, ptrace uses what credentials it knows of to authorize.
*You* can make it more finegrained by not insisting on running everything
as a single user.

What you now are trying to do is find a new, natural relationship between
tasks on a plain DAC system to provide finer-grained control. The one you
picked - process ancestry - doesn't perfectly fit, so you add changes and
make it less clean. The criticism of that is valid and needs to be
discusssed.

Adding new relationships between tasks is what LSMs do - based on the
policy-defined relationships between the security tasks of the respective
domains. And it feeld natural there - so it's natural for SELinux and
apparmor to confine firefox to a domain that can't ptrace anything else
(and maybe not itself).

One q then is whether YAMA wants to provide task tracking of its own, or
stack with apparmor.

> > There are several existing LSMs with the ability to control ptrace, but as
> > part of a system-wide, coherent, analyzable policy -- often in support of
> > specific security models for which there is concrete user demand and
> > benefit.
>
> Sure. I am curious, though, is there a way for SELinux (or maybe Smack,
> since it has more dynamic labels) to declare this kind of on-runtime PTRACE
> relationship? Maybe I overlooked some options for this. I didn't see any

In SELinux, you could give a debugger or crash handler an unprivileged, but
allowed-to-ptrace-the-main-app domain.

> I still think simple chaining is the way to go. I want to review the
> earlier discussions first (I think Serge said it was in 2004ish?) before I
> write up anything. There is, I think, one sticking point, which is
> /proc/self/attr/current, but beyond that, I think some simple
> reorganization of LSM initialization routines and a list that security_*
> walks would be sufficient.

In the past, output results for each LSM were simply split by \n or a :
or something, and input was prepended by the LSM name.

-serge
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/