lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 16 Apr 2019 18:40:08 +1000 From: Andrew Donnellan <andrew.donnellan@....ibm.com> To: Matthew Garrett <matthewgarrett@...gle.com>, jmorris@...ei.org Cc: linux-security-module@...r.kernel.org, linux-kernel@...r.kernel.org, dhowells@...hat.com, linux-api@...r.kernel.org, luto@...nel.org, linuxppc-dev <linuxppc-dev@...ts.ozlabs.org>, Michael Ellerman <mpe@...erman.id.au>, Daniel Axtens <dja@...ens.net>, cmr <cmr@...ormatik.wtf> Subject: Re: [PATCH V32 01/27] Add the ability to lock down access to the running kernel image On 4/4/19 11:32 am, Matthew Garrett wrote: > diff --git a/Documentation/ABI/testing/lockdown b/Documentation/ABI/testing/lockdown > new file mode 100644 > index 000000000000..5bd51e20917a > --- /dev/null > +++ b/Documentation/ABI/testing/lockdown > @@ -0,0 +1,19 @@ > +What: security/lockdown > +Date: March 2019 > +Contact: Matthew Garrett <mjg59@...gle.com> > +Description: > + If CONFIG_LOCK_DOWN_KERNEL is enabled, the kernel can be > + moved to a more locked down state at runtime by writing to > + this attribute. Valid values are: > + > + integrity: > + The kernel will disable functionality that allows > + userland to modify the running kernel image, other > + than through the loading or execution of appropriately > + signed objects. > + > + confidentiality: > + The kernel will disable all functionality disabled by > + the integrity mode, but additionally will disable > + features that potentially permit userland to obtain > + confidential information stored within the kernel. [+ linuxppc, mpe, dja, cmr] I'm thinking about whether we should lock down the powerpc xmon debug monitor - intuitively, I think the answer is yes if for no other reason than Least Astonishment, when lockdown is enabled you probably don't expect xmon to keep letting you access kernel memory. Semantically though, xmon is not a userspace process - it's in kernel and reads debug commands/outputs debug data directly from/to the console. Is that a threat vector that this series cares about? -- Andrew Donnellan OzLabs, ADL Canberra andrew.donnellan@....ibm.com IBM Australia Limited
Powered by blists - more mailing lists