Unprivileged BPF and authoritative security hooks
Unprivileged BPF and authoritative security hooks
Posted Apr 28, 2023 11:10 UTC (Fri) by farnz (subscriber, #17727)In reply to: Unprivileged BPF and authoritative security hooks by taladar
Parent article: Unprivileged BPF and authoritative security hooks
If everything's stackable LSMs, and you assume a competent administrator, you only need the ability to remove permissions at each layer.
Before the LSM stack gets to make decisions, your user is omnipotent, and can do everything. Each layer of the stack can reject the user's request; if nothing in the stack rejects the request, then the user is allowed to do the thing.
It then becomes debuggable - all requests are approved by default, and the kernel can tell you which part of the LSM stack rejected any given request. You can thus design your stack so that all layers deny by default, and use the kernel's advice to open up permissions as and when you need them.
