lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1306333251.2211.22.camel@dan>
Date:	Wed, 25 May 2011 10:20:51 -0400
From:	Dan Rosenberg <drosenberg@...curity.com>
To:	Ingo Molnar <mingo@...e.hu>
Cc:	Tony Luck <tony.luck@...il.com>, linux-kernel@...r.kernel.org,
	davej@...hat.com, kees.cook@...onical.com, davem@...emloft.net,
	eranian@...gle.com, torvalds@...ux-foundation.org,
	adobriyan@...il.com, penberg@...nel.org, hpa@...or.com,
	Arjan van de Ven <arjan@...radead.org>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Valdis.Kletnieks@...edu, pageexec@...email.hu
Subject: Re: [RFC][PATCH] Randomize kernel base address on boot

On Wed, 2011-05-25 at 13:23 +0200, Ingo Molnar wrote:
> * Dan Rosenberg <drosenberg@...curity.com> wrote:
> 
> > > No, the right solution is what i suggested a few mails ago: 
> > > /proc/kallsyms (and other RIP printing places) should report the 
> > > non-randomized RIP.
> > > 
> > > That way we do not have to change the kptr_restrict default and 
> > > tools will continue to work ...
> > 
> > Ok, I'll do it this way, and leave the kptr_restrict default to 0.  
> > But I still think having the dmesg_restrict default depend on 
> > randomization makes sense, since kernel .text is explicitly 
> > revealed in the syslog.
> 
> Hm, where is it revealed beyond intcall addresses, which ought to be 
> handled if they are printed via %pK?
> 
> All such information leaks need to be fixed. (This will be the 
> slowest part of the process i suspect - there's many channels.)
> 
> in the syslog we obviously want any RIPs converted to the canonical 
> 'unrandomized' address, so that it can be matched against 
> /proc/kallsyms, etc. Their randomized value isnt very useful. That 
> will also protect the randomization secret as a side effect.
> 

%pK doesn't seem like the right thing to do in many cases, since the
capability check doesn't have proper meaning if the caller isn't in
process context.  If I'm understanding you right (correct if I'm wrong),
you're looking for kptr_restrict to be completely separate from this
randomization, and when randomization is enabled, all pointers are
unconditionally de-randomized.  It seems like the right way to do this
is to include code in vsprintf.c for all %p-type specifiers that would
normally print the actual pointer (as opposed to some of the specialized
cases that print other data) that does something like this:

if((unsigned long)ptr >= (unsigned long)_stext &&
   (unsigned long)ptr <= (unsigned long)_end)
	ptr -= (_text - (CONFIG_PHYSICAL_START + PAGE_OFFSET));

This way, we don't have to go tracking down every printk caller and
convert them to %pK, which isn't usable anyway in some cases.

> The only thorny issue AFAICS are oopses. There's real value in having 
> 'raw' data from a crash (interpreting crashes is hard enough even 
> without randomization!), OTOH we could keep most of the value of them 
> by converting them back to canonical addresses.
> 
> This would be more or less easy to do for the RIP and the registers, 
> but less obvious for the stack: a kernel pointer can lie on the stack 
> at arbitrary alignment. On 64-bit we could probably detect them 
> rather reliably based on the randomized prefix of kernel addresses:
> 
> [   32.946003] Stack:
> [   32.946003]  0000000000000202 0000000000000002 0000000000000001 0000000000000000
> [   32.946003]  0000000000000198 0000000000000002 0000000000000000 00000000002ca5b0
> [   32.946003]  0000000000000000 ffff88003e5533e0 ffff88003f977c00 ffffffff802225e3
> 
> the ffffffff8 prefix (assuming we end up randomizing the address 
> within the 2GB window available to a RIP-relative addressed kernel) 
> would be easy to detect even if it's not word aligned. There *would* 
> be false positives (a 32-bit value of -7 is common), but as long as 
> we marked any unrandomization clearly with an asterix:
> 
> [   32.946003] Stack:
> [   32.946003]  0000000000000202 0000000000000002 0000000000000001 0000000000000000
> [   32.946003]  0000000000000198 0000000000000002 0000000000000000 00000000002ca5b0
> [   32.946003]  0000000000000000*ffff88003e5533e0*ffff88003f977c00*ffffffff802225e3
> 
> we'd be informed that the stack content was slighly different. If we 
> fixed up register values, say the raw value is:
> 
> [   32.946003] RDX: 0000000000000000 RSI: ffffffff80ce0100 RDI: 0000000000000000
> 
> and randomization is -0x100000 then we'd print the normalized value 
> for 'RSI':
> 
> [   32.946003] RDX: 0000000000000000 RSI:*ffffffff80de0100 RDI: 0000000000000000
> 
> And the '*' tells us that this value got normalized.
> 
> On 32-bit systems the rate of false positive is probably higher, he 
> '0xc0' byte pattern is pretty common.
> 
> Now, theoretically there's still a tiny information hole here: if an 
> attacker can crash a kernel in a non-fatal way that puts some known 
> data on the kernel stack, then the unrandomization will reveal the 
> secret ...
> 
> I guess we'll have to live with that: really paranoid places will 
> disable dmesg access to unprivileged users.

I'm tempted to just say "leave OOPS alone", and if you want to preserve
secrecy past an OOPS, you should be disabling dmesg access anyway.  But
I'll think more about this.

> 
> [ They might also want to have a knob to not log kernel crashes at 
>   all - best protection is if *no one* (not even root) has a way to 
>   figure out the secret. That needs to go hand in hand with forced 
>   use of signed modules, sanitized /dev/mem, no root-controllable DMA 
>   access to any device, no ioperm() and iopl(), etc. - so a very 
>   locked down kernel that protects even root from being able to 
>   execute kernel code. Such systems are still useful btw even if root 
>   otherwise has access to all disks and has access to the kernel 
>   image and can install its own image: a reboot will generally set 
>   off an alarm. ]
> 
> > Thanks very much for the feedback.
> 
> Hey, thanks for taking up on implementing this rather non-trivial 
> security feature!
> 

What can I say, I like a challenge. :)

-Dan

> Thanks,
> 
> 	Ingo


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ