Re: default `kernel.yama.ptrace_scope = 0` revisited. update to >=1 ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

Not really here to defend the current setting. But I have run with it set to 
1 for several years and have not noticed any real issues. 

-Steve

On Monday, August 12, 2024 10:27:18 AM EDT pgnd wrote:
> in
> 
> 	distro
> 		Name: Fedora Linux 40 (Forty)
> 		Version: 40
> 		Codename:
> 
> 	uname -rm
> 		6.10.3-200.fc40.x86_64 x86_64
> 
> 
> default ptrace is DISABLED,
> 
> 	cat /usr/lib/sysctl.d/10-default-yama-scope.conf
> 		...
> 		kernel.yama.ptrace_scope = 0
> 
> 	grep -iE "yama|ptrace" /boot/config-6.10.3-200.fc40.x86_64
> 		# CONFIG_YAMAHA_YAS530 is not set
> 		CONFIG_SECURITY_YAMA=y
> 		CONFIG_LSM="lockdown,yama,integrity,selinux,bpf,landlock"
> 
> provided by
> 
> 	rpm -q --whatprovides /usr/lib/sysctl.d/10-default-yama-scope.conf
> 		elfutils-default-yama-scope-0.191-4.fc40.noarch
> 
> required by
> 
> 	dnf repoquery --requires elfutils-default-yama-scope
> !!		/bin/sh
> 
> listed as 'medium' severity at, e.g.,
> 
> 	RHEL 9 must restrict usage of ptrace to descendant processes.
> 	
> https://www.stigviewer.com/stig/red_hat_enterprise_linux_9/2023-09-13/find
> ing/V-257811
 
> 		"Unrestricted usage of ptrace allows compromised binaries to run 
ptrace
> on other
 processes of the user. Like this, the attacker can steal
> sensitive information from the target processes (e.g., SSH sessions, web
> browser, etc.) without any additional assistance from the user (i.e.,
> without resorting to phishing). Satisfies: SRG-OS-000132-GPOS-00067,
> SRG-OS-000480-GPOS-00227" 
> &
> 
> 	Protect against ptrace of processes: kernel.yama.ptrace_scope
> 	
> https://linux-audit.com/protect-ptrace-processes-kernel-yama-ptrace_scope/
> 
 
> both recommend
> 
> 	kernel.yama.ptrace_scope > 0
> 
> it's been discussed at great length @ Fedora/RH long ago,
> 
> 	Bug 1209492 - BUG: Yama blocks ptrace'ing my own process
> 	 https://bugzilla.redhat.com/show_bug.cgi?id=1209492
> 
> 	Bug 1250178 - Review Request: yama-config-disable-ptrace - Disable Yama
> ptrace restrictions at boot
> https://bugzilla.redhat.com/show_bug.cgi?id=1250178
> 
> in the above discussions, use cases including "password manager" are
> bandied about.
 
> it's recently raised its head in a password manager -- 1password,
> specifically
 
> 	https://1password.community/discussion/comment/715818/#Comment_715818
> 
> , which had/has affected a significant # of users here.
> 
> afaict (?) no further discussion @ RH BZ since the 2015 thread,
> the original assignee left RH, off to MS,
> and, the "= 0" default remains as of today, stating clearly @
> 
> 	/usr/lib/sysctl.d/10-default-yama-scope.conf
> 
> 		...
> 		# This runtime kernel parameter can be set to the following 
options:
> !!		# (Note that setting this to anything except zero will break
> programs!)
 ...
> 
> given the advisories, the current effects on userspace apps, and other
> distros' (Debian/Ubuntu at least) switch to "=1", what's the current
> rationale for keeping the Fedora *default* sysctl = 0?
 
> 




-- 
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux