On Wed, Nov 11, 2015 at 09:10:13PM +0100, Jozsef Kadlecsik wrote: > On Wed, 11 Nov 2015, Phil Whineray wrote: > > > On Wed, Nov 11, 2015 at 07:48:11PM +0100, Jan Engelhardt wrote: > > > On Wednesday 2015-11-11 19:40, Florian Westphal wrote: > > > >Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> wrote: > > > >> > Hiding the contents from non-root users does not achieve anything > > > >> > practical. Possible values are well-known and the specifics can > > > >> > be inferred from a list of loaded modules on most systems. > > > > > > Conversely, an administrator could just load all modules to give a false > > > impression. Since the adversary can in turn expect it, he knows as > > > little as before. In particular, containerized environments will have it > > > such that many modules are loaded, but each container still has their > > > own ruleset. > > > So yeah, hiding the contents is not going to achieve anything - nor is > > > showing. (I am concurring here with the other respondents.) > > > > Sorry - I've gotten confused about who thinks what exactly. I hope > > the below isn't wasting everyone's time. > > My opinion is that the files should not be exposed. Whenever it does not > clash something vital and cannot be resolved I run kernels with grsec, > where normal user cannot list the loaded in kernel modules. By exposing > these files, some part of that data would then be leaked out. > > > Unhiding /proc/ip_tables_names content achieves something specific: it > > is used by iptables-save to determine what it should write out (in > > the absence of a specific table being asked for, which I believe is > > the norm). > > > > I currently have a workaround using a horrific series of bind mounts > > which substitutes in a normal file with the values iptables-save expects. > > > > Two alternates on the table are: > > > > - change ownership of the file in the namespace (wherein a user runs > > "unshare -U -r -n cat /proc/net/ip_tables_names" to do the same as > > "cat /proc/net/ip_tables_names" with 0444 perms, so not adding much > > unless unprivileged namespaces are disabled. > > I don't quite understand this: if the ownership of the files are changed, > then why do you need to change the access right to 0444? You're right, I don't. I was just noting point that if unprivileged namespaces are available, either suffices for a regular user to see the contents. Cheers Phil -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html