OpenVZ Forum


Home » Mailing lists » Devel » Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem.
Re: [patch 1/2] [RFC] Simple tamper-proof device filesystem. [message #25331 is a reply to message #25218] Tue, 18 December 2007 02:26 Go to previous message
Tetsuo Handa is currently offline  Tetsuo Handa
Messages: 3
Registered: December 2007
Junior Member
Hello.

Serge E. Hallyn wrote:
> But your requirements are to ensure that an application accessing a
> device at a well-known location get what it expect.

Yes. That's the purpose of this filesystem.


> So then the main quesiton is still the one I think Al had asked - what
> keeps a rogue CAP_SYS_MOUNT process from doing
> mount --bind /dev/hda1 /dev/null ?

Excuse me, but I guess you meant "mount --bind /dev/ /root/" or something
because mount operation requires directories.
MAC can prevent a rogue CAP_SYS_MOUNT process from doing
"mount --bind /dev/ /root/".
For example, regarding TOMOYO Linux, you need to give
"allow_mount /dev/ /root/ --bind 0" permission
to permit "mount --bind /dev/ /root/" request.

Did you mean "ln -s /dev/hda1 /dev/null" or "ln /dev/hda1 /dev/null"?
No problem. MAC can prevent such requests too.

Regards.
_______________________________________________
Containers mailing list
Containers@lists.linux-foundation.org
https://lists.linux-foundation.org/mailman/listinfo/containers
 
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Read Message
Previous Topic: [PATCH net-2.6.25][NEIGH] Make neigh_add_timer symmetrical to neigh_del_timer
Next Topic: [PATCH] OOPS with NETLINK_FIB_LOOKUP netlink socket
Goto Forum:
  


Current Time: Sun Oct 12 14:10:55 GMT 2025

Total time taken to generate the page: 0.13088 seconds