On Sun, Dec 28, 2014 at 10:52:38PM -0500, Jude Nelson wrote:
> Here's a more practical example that hides /dev/input/* and /dev/dri/* from
> every program except the X server (installed to /usr/bin/X):
> 
> [vdev-acl]
> bin=/usr/bin/X
> paths=input/.*|dri/.*
> setmode=0666

This seems broken to me... as in, the very idea you can trust a process
because of its executable will give people a false sense of security.

If a process runs with your uid, you can have it do anything you do want
by a number of methods.  You can ptrace it, LD_PRELOAD, use a ld of your
own, etc.

The only way to secure this is to use setuid, but then, you already have
a better way selector to build the ACL on.

Thus, I think you'd be better off without bin= stanzas.

-- 
// If you believe in so-called "intellectual property", please immediately
// cease using counterfeit alphabets.  Instead, contact the nearest temple
// of Amon, whose priests will provide you with scribal services for all
// your writing needs, for Reasonable and Non-Discriminatory prices.
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to