Re: [PATCH RFC] Restrictions on module loading
From: Alan Cox
Date: Mon Nov 08 2010 - 05:21:40 EST
> loading of kernel modules, for example by creating a socket using a
> packet family that is compiled as a module and not already loaded. On
> most distributions, this creates a significant attack surface, and
> requires maintenance of blacklists and other inelegant solutions to a
> general problem.
Those inelegant solutions work rather better in a lot of situations
because most distributions will fall flat on their face if auto loading
isn't active and they are more flexible.
> The below patch replaces the existing "modules_disable" sysctl with a
NAK - Its a long standing ABI.
> When set to 2, modules may not be loaded or unloaded by anyone, and the
> sysctl may not be changed from that point forward. This is designed to
> provide protection against kernel module rootkits.
I've no objection to modules_restrict although I doubt it'll ever get
used in the real world, but better to extend the meaning of the existing
interface, not remove stuff.
If you have "security" in your address the please think like a security
person - users with security relying upon writing to modules_disable are
*not* going to notice a one line log entry somewhere about unable to open
{filename that doesn't look important}.
So your change is actually *bad* for security in its current form, you
remove the facilities they rely upon.
Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/