Re: RFC PATCH: apply security_syslog() only to the syslog()syscall, not to /proc/kmsg
From: Stephen Smalley
Date: Thu Nov 09 2006 - 09:52:47 EST
On Wed, 2006-11-08 at 20:14 -0800, Chris Wright wrote:
> * Sergey Vlasov (vsu@xxxxxxxxxxx) wrote:
> > Then what would you think about another solution:
> >
> > 1) When sys_syslog() is called with commands 2 (read) or 9 (get unread
> > count), additionally call security_syslog(1) to check that the
> > process has permissions to open the kernel log. This change by
> > itself will not make any difference, because all existing
> > implementations of the security_ops->syslog hook treat the operation
> > codes 1, 2 and 9 the same way.
> >
> > 2) Change cap_syslog() and dummy_syslog() to permit commands 2 and 9
> > for unprivileged users, in addition to 3 and 10 which are currently
> > permitted. This will not really permit access through sys_syslog()
> > due to the added security_syslog(1) check, but if a process somehow
> > got access to an open file descriptor for /proc/kmsg, it would be
> > able to read from it. Also, because selinux_syslog() is not
> > changed, under SELinux the process will still need to have
> > additional privileges even if it has /proc/kmsg open.
>
> It's a bit clumsy in the extra caveats for sys_syslog and cap_syslog,
> but does achieve what you're after. We lose default checking on the
> actual read access, but perhaps this is a fair tradeoff. Stephen,
> James do you have any issues with this for SELinux?
It makes the already unfortunate coupling between the security modules
and the core syslog code even worse, by making assumptions about how the
security modules treat different type codes. If you were to go down
this route, I think you would want to map the type codes to abstract
permissions in the core syslog code and only pass the abstract
permissions to the security modules (so that they no longer see 2, 9,
and 1 separately but as a single permission). Might be nice to have
actual #define's for the type codes too.
We wouldn't want the SELinux checking changed; we can already run klogd
confined by policy, and decomposition into privileged and unprivileged
components is preferable to privilege bracketing within a single
component.
--
Stephen Smalley
National Security Agency
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/