|   | 
| 
 | 
Message-ID: <20111109175017.GA31883@albatros>
Date: Wed, 9 Nov 2011 21:50:17 +0400
From: Vasiliy Kulikov <segoon@...nwall.com>
To: owl-dev@...ts.openwall.com
Subject: procfs and tty timing infoleaks
Solar, all -
Given latest LKML discussions about scheduler and timestamp infoleaks,
I think we can break backward compatibility via patching procps in Owl.
In details, I propose:
1) restrict access to /proc/$PID/{stat,sched,schedstat}.  Patch procps
to gracefully handle -EPERM as if all stats are zeroes.
2) chmod /proc/{interrupts,stat} to 0400.
3) fill zeroes in tty mtime/atime fields on stat() family syscalls.
Alternative - not to patch these ourselves too and propose procfs patch
upstream; after we get ACK/NACK, backport it to RHEL5 kernel and to RHEL6
after we move to it.  But it still has a major issue - as all procfs
files should check permissions on read/write, all 0444 procfs files
currently missing ptrace check will need it too (which is quite messy
with runtime configurabe approach).
Thanks,
-- 
Vasiliy
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.