Re: Currently the kernel is interpreting reading the link file on /proc/PID/exe as sys_ptrace for a different UID.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2012-02-14 at 08:57 -0500, Daniel J Walsh wrote:
> On 02/13/2012 06:09 PM, Stephen Smalley wrote:
> > On Mon, Feb 13, 2012 at 1:49 PM, Daniel J Walsh <dwalsh@xxxxxxxxxx>
> > wrote:
> >> I believe this should be DAC_READ_SEARCH.
> >> 
> >> I am trying to prevent all SYS_PTRACE from any domain on the
> >> system but certain apps like dbus, consolekit, policykit,
> >> systemd-logger and others like to look /proc/PID/exe to report
> >> the path of the executable they are communicating with.  This
> >> causes lots of sys_ptrace access being required for domains, that
> >> I do not believe need it.
> >> 
> >> They need DAC_READ_SEARCH because they are trying to read content
> >> that is owned by a different UID.  The SYS_PTRACE stuff was put
> >> in to prevent apps from reading process memory information stored
> >> in /proc.
> >> 
> >> I think this is a bug in the kernel.
> > 
> > SELinux just mirrors the Linux capability checks.  CAP_SYS_PTRACE
> > is applied when the normal DAC check on ptrace fails (i.e.
> > different uid).  The SELinux MAC check here is the :process ptrace
> > check.  That is what you should focus on - SELinux already
> > distinguishes /proc access from ptrace (except for /proc/pid/mem,
> > which is viewed as equivalent).  dontaudit :capability sys_ptrace
> > where needed, but not :process ptrace.
> 
> But I have to allow all these domains capability sys_ptrace then,
> since these domains legitimately want to either use an access check
> based on the executable of the process or in the case of the
> systemd_jounal, want to log it.
> 
> If the CAP check on reading a symbolic link in /proc is SYS_PTRACE,
> that seems bogus.  If it was reading /proc/pid/mem or any of the other
> /proc/pid fields that tell you about the memory, then I agree those
> should be SYS_PTRACE.  But this is a DAC_READ_SEARCH check in my opinion.

What you are asking for is a change to the Linux DAC logic, not a change
to SELinux.  You can certainly investigate that, but that has to be
taken up on lkml, not here.

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux