Re: PATCH: cdrecord: avoiding scsi device numbering for ide devices
From: Christer Weinigel
Date: Sun Aug 22 2004 - 11:02:51 EST
Pascal Schmidt <der.eremit@xxxxxxxx> writes:
> I would even go as far as *not* to have that mean "you can also
> read/write via SG_IO", because for normal uses of the device,
> read(2) and write(2) should be enough.
Ripping a CD is in my opinion a normal use of a CD.
> On Sun, 22 Aug 2004, Joerg Schilling wrote:
> > There are several SCSI commands that look safe but would result in coasters
> > if issued while a CD or DVD is written.
>
> Good point.
Not really, if I have write permisson to a CD burner, being able to
burn a coaster by issuing strange commands is something I expect.
Being able to destroy the firmware of the drive is not something I
expect a normal user to be able to do.
There are at least three conflicting goals here:
1. Only someone with CAP_SYS_RAWIO (i.e. root) should be able to do
possible destructive things to a device, and only root should be
able to bypass the normal security checks in the kernel (e.g. get
access to /dev/mem since access to it means that you can read and
modify internal kernel structures).
2. A Linux system should have as few suid root binaries as possible.
3. A normal user should be able to perform most tasks without needing
root.
As you said, since the old kernel behaviour is a gaping security hole,
Linus had no other choice than to add a CAP_SYS_RAWIO check to the
SG_IO call. This fulfills goal 1. Unfortunately it breaks just about
every application that expects to be able to send raw SCSI commands
without being root.
There are a couple of ways of fulfilling goal 3 and allow normal users
to burn a CDR:
One is to make cdrecord suid root and then make it drop all
capabilities except for SYS_CAP_RAWIO. But even if cdrecord is
audited, there are a lot of other applications that need to be able to
send raw SCSI commands such as mt (to change the compression or tape
format of a streamer). And this violates goal 2, every security guide
I've seen lately recommends minimizing the amount of suid binaries,
not adding more.
Another way is to add specialized ioctls in the kernel for everything,
such as the CDROMPLAYTRKIND to play a track. Unfortunately, this gets
a bit unmaintainable with all the different devices out there. It
would be akin to putting the whole of cdrecord into the kernel.
Yet another way is to try to filter the raw SCSI commands and only
allow through "known safe" commands, which is what some other people
have been trying to do.
I think Joerg is being much too harsh, adding a check for
CAP_SYS_RAWIO fixes a bloody large security hole. It broke a few
applications, but tough shit, that is what happens every now and then
when plugging security holes. It would be much worse to leave the
hole open. The timing may coincide badly with the release cycle of
cdrecord, but thats life. For now users will have to run cdrecord as
root to be able to burn a CDR.
In the future, add a patch to cdrecord so that it can be run as suid
root and not drop CAP_SYS_RAWIO which will make most users happy.
It's still a violation of goal 2 but one has to do tradeoffs every now
and then.
For the future, well, I'm not sure, but personally I think that the
filter idea is a pretty good one. It is a coarse sieve, but by
listing some "known safe" commands most applications should work, and
if somebody needs to send a command that isn't considered as safe yet,
he can just run the application as root instead.
In my opinion, the best way forward would be to only have a
CAP_SYS_RAWIO check in the kernel and an installable command filter
that can be configured from userspace. So when the next version of
snazzycdwriter(tm) is released it can have a line in the README file
saying:
If you want to be able to run snazzycdwriter(tm) as a normal user,
add the following command to your rc.local file:
/sbin/install-scsi-filter /dev/hdc snazzycdwriter.filter
And if you have a tape drive, it could have another list of safe
commands.
/Christer
--
"Just how much can I get away with and still go to heaven?"
Freelance consultant specializing in device driver programming for Linux
Christer Weinigel <christer@xxxxxxxxxxx> http://www.weinigel.se
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/