/srv/irclogs.ubuntu.com/2008/06/24/#ubuntu-kernel.txt

mjg59You'd want a pretty definitive case before going to court00:00
BenCmakes sense00:00
BenCplus, it would ripple all over the place00:00
BenCkernel headers in glibc (LGPL) come to mind00:00
=== cjwatson_ is now known as cjwatson
=== thegodfather is now known as fabbione
=== asac_ is now known as asac
Kanohi, you did not add gspca yet13:45
Kanowhen will you do so for 2.6.2613:45
BenCKano: when we get to it14:17
BenCreally, asking us questions like that is like trying to predict the weather14:17
Kanowell the driver works, should be really easy to add14:17
BenCKano: It will get done, just priorities is all14:18
kirklandrtg: i see you have committed a fix for https://bugs.edge.launchpad.net/ubuntu/+source/linux/+bug/24244817:33
kirklandrtg: is there a kernel built that I can install/test this?17:33
rtgkirkland: not yet. I'll upload to my PPA and get it built today.17:37
kirklandrtg: cool, update that bug with a pointer to your PPA.  myself and hallyn are willing to verify the fix for you.17:37
kirklandrtg: we're both subscribed17:37
rtgkirkland: it'll likely take a few hours.17:38
kirklandrtg: that's fine... no rush, whenever17:38
kirklandrtg: also, you might be interested that mhalcrow is working on a pretty small, simple patch to ecryptfs that would give sort of a "root_squash" capability17:38
kirklandrtg: you'd add an option to the mount params, like ecryptfs_exclusive_access_uid=1000 or something, and the kernel would check that on all reads/writes to the mounted files17:39
kirklandrtg: i think you were asking about something like this earlier17:39
rtgkirkland: which addresses my concern about root visibility on multi-user machines?17:39
kirklandrtg: yup17:39
kirklandrtg: the 5-minute patch he threw together when I asked him about it looks like: http://halcrow.us/~mhalcrow/patches/ecryptfs-excl-access-20080623.txt17:40
kirklandrtg: i'm hoping he'll get something like this into mainline soon....17:41
kirklandrtg: are we sticking with 2.6.26 for intrepid?17:41
rtgkirkland: 2.6.26 is the target version17:41
rtgkirkland: of course, we can cherry-pick some upstream fixes like this one.17:42
kirklandrtg: that's sort of what i was asking17:42
kirklandrtg: okay, let's see it get upstream first17:42
rtgkirkland: instead of "root_squash" capability, it looks more like "exclude foreign euid" capability. Can't root get around the UID issue by running a script in the context of the UID?17:46
kirklandrtg: yeah, this idea spun off the "root_squash" idea, and is intended to be even more specific17:46
kirklandrtg: but as you say, root can change his uid.....17:48
rtgkirkland: while this mount option would keep other users out, it only makes it slightly more difficult for root to go snooping.17:48
kirklandrtg: true...  hmm, ultimately, this should be key-based17:48
rtgkirkland: kees might be a good guy to ask about this. perhaps there is an AppArmor or SMACK approach the is not vulnerable to root snooping.17:50
kirklandrtg: well, there's certainly an SELinux approach17:51
kirklandrtg: add some SELinux hooks to ecryptfs is a long term goal of the ecryptfs developers17:51
kirklandrtg: but that's non-trivial, IIUC17:51
kirklandrtg: i'm not sure about AppArmor or SMACK17:52
kirklandrtg: you'll get a kick out of this....18:22
kirklandrtg: ->  mhalcrow: could we prevent root from running a script as that user and accessing the data?18:22
kirkland<mhalcrow> Yes. It's called SE Linux18:22
rtgkirkland: well, I guess that makes sense :)18:23
kirklandrtg: <mhalcrow> If you don't want root to be root, that's what you really need.18:23
SEJefflabel based security does things path based security can't18:25
kirklandrtg: if you have a minute, i'd like to invite mhalcrow here.  i'd like to decide whether or not it's of value to do the exclusive_uid thing, or not, and i'd like your opinion on the kernel matter at hand18:45
rtgkirkland: the patch doesn't look so bad, but it doesn't really solve the root snooping issue, so is it worth it? It does keep unprivileged users from looking around.18:46
kirklandrtg: true for unprivileged users, but that can be handled just by normal DAC, chmod +70018:47
rtgkirkland: is that the default mount permissions?18:48
kirklandrtg: not a mount issue; ownership on the mountpoint/device itself18:48
rtgkirkland: right, thats what I meant18:48
rtgkirkland: so, unless there is a good use case, it doesn't seem that worthwhile.18:49
kirklandrtg: okay, we'll need to look into the proper way of squashing root priv's with apparmor/selinux18:50
rtgkirkland: that seems like the right approach.18:51
kirklandrtg: okay, i'll confer that over, thanks for the sounding-board18:52
rtgkirkland: in fact, its likely the same problem the folks at the NSA tried to solve with SELinux. They didn't want their admins looking at security stuff.18:52
kirklandrtg: yup18:52
kirklandmhalcrow: rtg and I talked this over, and we don't think this is going to gain us anything over DAC (as you mentioned)18:54
kirklandmhalcrow: other than basically being able to specify the DAC at mount time18:54
kirklandmhalcrow: and not worrying so much about file/dir permissions18:54
mhalcrowRight. It would just be a lazy way to apply blanket dac on the mount.18:54
kirklandrtg: do you see any value to that?18:55
mhalcrowI have always had a policy of not introducing redundant access control, because that tends to increase complexity and opportunities for unintended consequences.18:55
rtgkirkland, mhalcrow: seems like a false sense of security to me. really, this is an issue on a multi-user machine, so we need a bigger hammer then just UID protection.18:56
mhalcrowKeyring perms, ugo/rwx, capabilities, and SELinux provide everything you need for any access control model you have in mind.18:56
rtgmhalcrow: ok, then the current ecryptfs solution using SELinux is sufficient to prevent root snooping, correct?18:58
mhalcrowCorrect.18:58
mhalcrowKeys can be labeled.18:58
rtgI'm good with that.18:58
mhalcrowAnd eCryptfs passes through lower xattr's18:58
mhalcrowSo the label on the lower file propagates to the eCryptfs mount.18:58
rtgkirkland: so the SELinux ball is in your court. I assume this is something you'll have to add to ecryptfs-utils?18:59
kirklandmhalcrow: do you know if anyone's worked with ecryptfs+AppArmor?18:59
mhalcrowSeems trivially circumventable with a --bind mount, but I'd have to look more closely at AppArmor for eCryptfs mounts.18:59
kirklandrtg: sure, i'll take that one.  no promises that i'll solve the root-snoop problem by Intrepid, but i'll keep working it19:00
lechehey, i found a bug in the kernel, which was allrdy fixed and confirmed by the devs of lm-sensors. Hows the procedure, to get this into the ubuntu kernel?20:16
mjg59leche: What's the bug?20:17
lechemjg59: http://rafb.net/p/VAgiQx37.html20:18
mjg59leche: Ok. File a bug on launchpad.net, attach that patch and include a pointer to the upstream discussion thread.20:19
lecheok, thx20:20
lechemjg59: https://bugs.launchpad.net/ubuntu/+bug/242761 is the description complete or is something missing?20:32
rtgleche: its fine20:34
mjg59leche: Looks ok20:34
lechewhat do you mean with upstream discussion thread?20:34
mjg59Ideally a link to the thread where it was discussed20:36
rtgleche: what mjg59 means, was there any discussion of this patch on LKML? If so, then include a pointer to the start of the discussion.20:36
lechertg: no there wasnt, this was solved in irc and the lm-sensors mailing list20:37
rtgleche: I thought as much. the patch looks reasonable and straightforward, so its not controversial.20:38
lechertg: ok, whats the procedure now? im just asking cause im interested20:39
rtgleche: it'll eventually show up as an SRU request. The kernel won't be out much before mid-July.20:40
lechethats good to hear, so i dont have to apt-pin the actual kernel20:40
lechethx guys20:41
rtgleche: it will also be on my PPA by tomorrow morning. http://ppa.launchpad.net/timg-tpi/ubuntu20:41
lechethx alot guys20:43
=== rikai_ is now known as rikai

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!