Re: [RFC] [PATCH] [SECURITY] tightening ioctl()'s

Stephen C. Tweedie (sct@redhat.com)
Mon, 5 Jul 1999 10:23:39 +0100 (BST)


Hi,

On Fri, 2 Jul 1999 22:37:26 -0400 (EDT), "Albert D. Cahalan"
<acahalan@cs.uml.edu> said:

> Stephen C. Tweedie writes:
>> There is at least one user space program --- frag --- which uses FIBMAP
>> to tell you the fragmentation on a file.

> It is a covert channel. :-)
> Users could intentionally fragment a disk.

stat() is a covert channel. Let's ban /tmp. :)

>>> 20a21,22
>>>> if (!capable(CAP_SYS_ADMIN))
>>>> return -EPERM;
>>>
>>> Patch 2) - APPLIES TO fs/ext2/ioctl.c
>>
>> No, the SETVERSION is designed for use by NFS servers, and they should
>> be able to make the call with the fsuid of the requesting user.

> The above doesn't change the behavior you like AFAIK.
> You will generally need EUID to be root, but fsuid can be anything.
> This is good behavior.

Huh? You don't want to restrict it to euid or ruid root: all that the
nfs server should need is fsuid capability. Root shouldn't be an
issue at all.

--Stephen

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/