LWN: Comments on "The return of authoritative hooks" https://lwn.net/Articles/273822/ This is a special feed containing comments posted to the individual LWN article titled "The return of authoritative hooks". en-us Sat, 27 Sep 2025 04:48:09 +0000 Sat, 27 Sep 2025 04:48:09 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net The return of authoritative hooks https://lwn.net/Articles/275563/ https://lwn.net/Articles/275563/ FnH <div class="FormattedComment"><pre> Could someone explain to me why granting someone something you don't have by default (authorative) is different from not granting something you have by default to everyone else (restrictive)? </pre></div> Fri, 28 Mar 2008 20:39:17 +0000 Could allow inclusion of systrace? https://lwn.net/Articles/275085/ https://lwn.net/Articles/275085/ oak <div class="FormattedComment"><pre> <font class="QuotedText">&gt; You mean Roland McGrath's utrace?</font> Sorry, yes. I noticed that first/early patch(es) of it have gone to 2.6.25. <font class="QuotedText">&gt; (however, things like UML are in effect using it as such in any case, so </font> security-hole-inducing bugs in ptrace() *are* likely to get fixed.) Sounds promising. :-) </pre></div> Wed, 26 Mar 2008 18:52:54 +0000 Could allow inclusion of systrace? https://lwn.net/Articles/275028/ https://lwn.net/Articles/275028/ nix <div class="FormattedComment"><pre> You mean Roland McGrath's utrace? While incredibly nifty and a long-overdue revamp of the awful ptrace() interface, utrace hasn't been designed as a security enforcement mechanism either :) (however, things like UML are in effect using it as such in any case, so security-hole-inducing bugs in ptrace() *are* likely to get fixed.) </pre></div> Wed, 26 Mar 2008 15:38:11 +0000 Could allow inclusion of systrace? https://lwn.net/Articles/275014/ https://lwn.net/Articles/275014/ oak <div class="FormattedComment"><pre> Hm. Systrace site says this on security: "Just keep in mind that ptrace has not been designed as a security primitive and while the ptrace backend can restrict the behavior of programs in non-adversarial settings, there are many ways to circumvent it." Maybe ltrace (new kernel implementation for ptrace that is supposed to solve many of its problems) could help also on this? </pre></div> Wed, 26 Mar 2008 14:53:19 +0000 Could allow inclusion of systrace? https://lwn.net/Articles/274818/ https://lwn.net/Articles/274818/ Klavs <div class="FormattedComment"><pre> I would hope so too. I've always liked the concept of systrace - and it's simplicity is IMHO good for security. </pre></div> Tue, 25 Mar 2008 10:56:03 +0000 Could allow inclusion of systrace? https://lwn.net/Articles/274473/ https://lwn.net/Articles/274473/ AnswerGuy <p> Perhaps this consolidation will also pave the way for the inclusion of Niels Provos' <a href="http://www.systrace.org/">systrace</a> patches. </p><p> Systrace implements a brilliant, elegant, approach to security, by allowing any user to interpose a set of "firewall" rules between the code that they run and the kernel (via the system call APIs). </p><p> This approach is vastly simpler than SELinux, which loads up the system with a large number of additional labels (domains, types, roles), and which add additional options to many commands (the -Z flags to <i>ls, ps</i>, etc.) and is generally impossible for mere mortal to comprehend </p><p> Systrace allows a normal user to create a policy and limit the access by programs, without giving the user any additional systems level permissions beyond what he or she already had. (It essentially uses the <i>ptrace</i> mechanism). So a user can, for example, run Mozilla while restricting it read/write <i>open()</i> calls to just the ~/.mozilla and ~/Downloads directories. In that example a compromised Mozilla can only write to those two directories and can't plant a trojan in your ~/bin directory, for example. </p><p> Another advantage of systrace is that it's already included in NetBSD and OpenBSD, and available for OpenSolaris, and FreeBSD. That makes it the only viable security enhancement to UNIX-like systems which is cross-platform. Sat, 22 Mar 2008 04:28:40 +0000 The return of authoritative hooks https://lwn.net/Articles/274431/ https://lwn.net/Articles/274431/ rvfh <div class="FormattedComment"><pre> From the article, it seems LSM is seen as a way to restrict a user's rights from an original set, where I think it should be a way to say who can do what. Each user could then have a tick-box kind of configuration, which is in fact similar to making a user part of a group to give them access to a category of devices. But I suppose the all idea now would be to say like: user A cannot access /dev/sda* (the hard disk), but can access /dev/sdb* (a USB key that is known to belong to them). Correct? </pre></div> Fri, 21 Mar 2008 09:53:36 +0000 The return of authoritative hooks https://lwn.net/Articles/274296/ https://lwn.net/Articles/274296/ jengelh <div class="FormattedComment"><pre> <font class="QuotedText">&gt;An LSM hook can deny an action, but it can never empower a process to do something it would not have been allowed to do in the absence of the security module.</font> The MultiAdm LSM [ <a href="http://lwn.net/Articles/255650/">http://lwn.net/Articles/255650/</a> ] can give regular users extra capabilities, empowering them to do something they would not have been allowed otherwise. </pre></div> Thu, 20 Mar 2008 14:00:21 +0000