|
|
Log in / Subscribe / Register

Progress in security module stacking

Progress in security module stacking

Posted Mar 12, 2015 23:47 UTC (Thu) by peter-b (guest, #66996)
In reply to: Progress in security module stacking by rwmj
Parent article: Progress in security module stacking

I seem to remember that reporting a detailed reason for EACCES/EPERM to the violating process can cause an information leak.


to post comments

Progress in security module stacking

Posted Mar 15, 2015 21:33 UTC (Sun) by skissane (subscriber, #38675) [Link]

For every failed access decision, generate a random token (e.g. a UUID), record that token both in the LSM's audit logs and return it to the calling process, which then logs it using its usual mechanisms (e.g. print to stderr, write to some log file etc). Provide a utility which requires elevated privileges to run (e.g. root, membership of some group, etc), which when given such a token, scans the LSM's audit logs, and generates the detailed information on why the access attempt was rejected. That way, there is no information leak - you need to be privileged to find out why the access attempt failed - but for those with privilege it should be easier than it is at present.


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds