[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4B4A8309.9090801@schaufler-ca.com>
Date: Sun, 10 Jan 2010 17:46:49 -0800
From: Casey Schaufler <casey@...aufler-ca.com>
To: Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
CC: michael@...top.org, pavel@....cz, linux-kernel@...r.kernel.org,
netdev@...r.kernel.org, linux-security-module@...r.kernel.org,
andi@...stfloor.org, david@...g.hm, socketcan@...tkopp.net,
alan@...rguk.ukuu.org.uk, herbert@...dor.apana.org.au,
Valdis.Kletnieks@...edu, bdonlan@...il.com, zbr@...emap.net,
cscott@...ott.net, jmorris@...ei.org, ebiederm@...ssion.com,
bernie@...ewiz.org, mrs@...hic-beasts.com, randy.dunlap@...cle.com,
xiyou.wangcong@...il.com, sam@...ack.fr, serue@...ibm.com,
viro@...IV.linux.org.uk, Casey Schaufler <casey@...aufler-ca.com>
Subject: Re: [PATCH 2/3] Security: Implement disablenetwork semantics. (v4)
Tetsuo Handa wrote:
> Michael Stone wrote:
>
>> Examples of software that I want to be able to gain privileges normally include:
>>
>> rainbow, which requires privilege in order to add new accounts to the system
>> and in order to call setuid() but which does not require networking
>> privileges.
>>
>
> If the system is not using local files (i.e. /etc/passwd and /etc/shadow),
> the process who wants to add new accounts to the system might need network
> access (e.g. to LDAP server), doesn't it?
>
>
It's much worse than that. A user that has been network disabled
who tries using ls may find that it goes looking for the network
on each name lookup and has to wait for a timeout for each. Yet
another example of why Real Users hate security features with
such passion. Then, if there are local file entries that differ
from the "official" network account values when the library
functions finally fall back on the local values you get the wrong
names for file owners. Now we've made ls slow and untrustworthy
in the name of security.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists