Re: noexec on /dev/shm

2011-01-22 Thread John Reiser
On 01/22/2011 06:22 AM, Matthew Miller wrote: > On Fri, Jan 21, 2011 at 05:54:22PM +0100, Lennart Poettering wrote: >> The FHS is kinda old these days, and it has been a while since it was >> last updated. The LSB added some additional rules on top of it: > > As long as we keep in mind that we don

Re: noexec on /dev/shm

2011-01-22 Thread Matthew Miller
On Fri, Jan 21, 2011 at 05:54:22PM +0100, Lennart Poettering wrote: > The FHS is kinda old these days, and it has been a while since it was > last updated. The LSB added some additional rules on top of it: As long as we keep in mind that we don't follow the LSB at points where it is ridiculous. -

Re: noexec on /dev/shm

2011-01-21 Thread Lennart Poettering
On Fri, 21.01.11 15:01, Richard W.M. Jones (rjo...@redhat.com) wrote: > > If /tmp is not supposed to be used for data that is inconvenient to > > store in memory for whatever reason, and that should be automatically > > removed when it is not used, what _is_ it supposed to be used for? > > The FH

Re: noexec on /dev/shm

2011-01-21 Thread Richard W.M. Jones
On Thu, Jan 20, 2011 at 08:37:21AM +0100, Miloslav Trmač wrote: > Nathanael D. Noblet píše v Čt 20. 01. 2011 v 00:33 -0700: > > On 01/19/2011 12:11 PM, Callum Lerwick wrote: > > > On Thu, Dec 23, 2010 at 11:26 AM, drago01 wrote: > > >> Well /tmp should be mounted tmpfs anyway (I have been doing t

Re: noexec on /dev/shm

2011-01-19 Thread Miloslav Trmač
Nathanael D. Noblet píše v Čt 20. 01. 2011 v 00:33 -0700: > On 01/19/2011 12:11 PM, Callum Lerwick wrote: > > On Thu, Dec 23, 2010 at 11:26 AM, drago01 wrote: > >> Well /tmp should be mounted tmpfs anyway (I have been doing this for > >> years and it is working just fine). > >> tmp isn't a persis

Re: noexec on /dev/shm

2011-01-19 Thread Nathanael D. Noblet
On 01/19/2011 12:11 PM, Callum Lerwick wrote: > On Thu, Dec 23, 2010 at 11:26 AM, drago01 wrote: >> Well /tmp should be mounted tmpfs anyway (I have been doing this for >> years and it is working just fine). >> tmp isn't a persistent storage so it makes a lot of sense, and it is >> *not* a dumping

Re: noexec on /dev/shm

2011-01-19 Thread Tomasz Torcz
On Wed, Jan 19, 2011 at 01:11:08PM -0600, Callum Lerwick wrote: > On Thu, Dec 23, 2010 at 11:26 AM, drago01 wrote: > > Well /tmp should be mounted tmpfs anyway (I have been doing this for > > years and it is working just fine). > > tmp isn't a persistent storage so it makes a lot of sense, and it

Re: noexec on /dev/shm

2011-01-19 Thread Callum Lerwick
On Thu, Dec 23, 2010 at 11:26 AM, drago01 wrote: > Well /tmp should be mounted tmpfs anyway (I have been doing this for > years and it is working just fine). > tmp isn't a persistent storage so it makes a lot of sense, and it is > *not* a dumping ground for giant files (apps that try to do that ar

Re: noexec on /dev/shm

2011-01-07 Thread Adam Jackson
On Fri, 2011-01-07 at 11:46 +, Richard W.M. Jones wrote: > On Tue, Jan 04, 2011 at 05:42:12PM -0800, Garrett Holmstrom wrote: > > On Tue, Jan 4, 2011 at 4:31 PM, Bernie Innocenti wrote: > > > What sort of attack would this enable? > > > > > > Wait... any unprivileged process can create sockets

Re: noexec on /dev/shm

2011-01-07 Thread Richard W.M. Jones
On Tue, Jan 04, 2011 at 05:42:12PM -0800, Garrett Holmstrom wrote: > On Tue, Jan 4, 2011 at 4:31 PM, Bernie Innocenti wrote: > > What sort of attack would this enable? > > > > Wait... any unprivileged process can create sockets in the abstract > > namespace? Uh-oh. > > Any unprivileged process ca

Re: noexec on /dev/shm

2011-01-04 Thread Garrett Holmstrom
On Tue, Jan 4, 2011 at 4:31 PM, Bernie Innocenti wrote: > What sort of attack would this enable? > > Wait... any unprivileged process can create sockets in the abstract > namespace? Uh-oh. Any unprivileged process can prevent you from running X on a given display by using up the socket name that

Re: noexec on /dev/shm

2011-01-04 Thread Bernie Innocenti
On Wed, 2011-01-05 at 00:59 +0100, Lennart Poettering wrote: > Well, OK, bad wording on my side. Replace "fixed" by "guessable". What sort of attack would this enable? Wait... any unprivileged process can create sockets in the abstract namespace? Uh-oh. -- // Bernie Innocenti - http://codewi

Re: noexec on /dev/shm

2011-01-04 Thread Lennart Poettering
On Tue, 04.01.11 17:36, Adam Jackson (a...@redhat.com) wrote: > On Tue, 2011-01-04 at 14:11 +0100, Lennart Poettering wrote: > > > Misusing are ICE, X11, nspluginwrapper at least, since they do not use a > > random socket name but a fixed one, hence opening the door to DoS attacks. > > X's socke

Re: noexec on /dev/shm

2011-01-04 Thread Adam Jackson
On Tue, 2011-01-04 at 14:11 +0100, Lennart Poettering wrote: > Misusing are ICE, X11, nspluginwrapper at least, since they do not use a > random socket name but a fixed one, hence opening the door to DoS attacks. X's socket name isn't fixed. It's a function of whatever display name you asked for

Re: noexec on /dev/shm

2011-01-04 Thread Lennart Poettering
On Mon, 03.01.11 22:12, Bernie Innocenti (ber...@codewiz.org) wrote: > On my desktop, abstract namespace sockets are twice more popular than > the regular ones: > > ber...@giskard:~$ netstat -ax | grep @ | wc -l > 151 > ber...@giskard:~$ netstat -ax | grep -v @ | grep / | wc -l > 73 > > Mos

Re: noexec on /dev/shm

2011-01-03 Thread Bernie Innocenti
On Sat, 2010-12-25 at 19:37 +0100, Lennart Poettering wrote: > That basically means that besides systemd itself and maybe the D-Bus > system bus almost nobody can safely use fixed name abstract namespace > sockets. In particular user code that uses fixed name abstract namespace > sockets is necessa

Re: noexec on /dev/shm

2011-01-03 Thread Lennart Poettering
On Mon, 03.01.11 09:54, Chris Adams (cmad...@hiwaay.net) wrote: > > Once upon a time, Adam Jackson said: > > Sadly this turns out not to be the case, at least if I'm reading > > fs/pipe.c correctly. O_NOATIME will turn off atime updates, but mtime > > and ctime are still modified on every pipe

Re: noexec on /dev/shm

2011-01-03 Thread Chris Adams
Once upon a time, Adam Jackson said: > Sadly this turns out not to be the case, at least if I'm reading > fs/pipe.c correctly. O_NOATIME will turn off atime updates, but mtime > and ctime are still modified on every pipe write, and there's no such > thing as O_NOCMTIME even though the filesystem

Re: noexec on /dev/shm

2011-01-03 Thread Adam Jackson
On Thu, 2010-12-23 at 22:59 +0100, Lennart Poettering wrote: > On Mon, 20.12.10 19:16, Fernando Lopez-Lezcano (na...@ccrma.stanford.edu) > wrote: > > > this isn't exactly correct. > > > > in /dev/shm on linux we have: > > > > (a) unix-domain sockets for non-RT communication with the server

Re: noexec on /dev/shm

2010-12-25 Thread Lennart Poettering
On Sat, 25.12.10 11:51, Casey Dahlin (cdah...@redhat.com) wrote: > > Could you explain a bit perhaps? I'm not familiar with them... (or > > maybe you have a url I could surf to?) > > > Basically, you put a \0 in front of the path when you bind the socket. So, for > example, bind to "\0/jack/socket

Re: noexec on /dev/shm

2010-12-25 Thread Lennart Poettering
On Fri, 24.12.10 16:17, Fernando Lopez-Lezcano (na...@ccrma.stanford.edu) wrote: > > On 12/23/2010 01:52 PM, Lennart Poettering wrote: > > On Mon, 20.12.10 13:07, Fernando Lopez-Lezcano (na...@ccrma.stanford.edu) > > wrote: > >> I raise this issue because "The API for /dev/shm is shm_open()" > >

Re: noexec on /dev/shm

2010-12-25 Thread Fernando Lopez-Lezcano
On 12/23/2010 01:52 PM, Lennart Poettering wrote: > On Mon, 20.12.10 13:07, Fernando Lopez-Lezcano (na...@ccrma.stanford.edu) > wrote: >> I raise this issue because "The API for /dev/shm is shm_open()" >> statement above means to me that in the future there will be no file api >> access to a ram m

Re: noexec on /dev/shm

2010-12-25 Thread Casey Dahlin
On Thu, Dec 23, 2010 at 09:11:46AM -0800, Fernando Lopez-Lezcano wrote: > On 12/22/2010 12:56 PM, Casey Dahlin wrote: > >On Mon, Dec 20, 2010 at 07:16:21PM -0800, Fernando Lopez-Lezcano wrote: > >>This is from Paul Davis, the main architect of Jack (I forwarded him > >>your post): > >> > >> > >

Re: noexec on /dev/shm

2010-12-23 Thread Lennart Poettering
On Mon, 20.12.10 19:16, Fernando Lopez-Lezcano (na...@ccrma.stanford.edu) wrote: > this isn't exactly correct. > > in /dev/shm on linux we have: > > (a) unix-domain sockets for non-RT communication with the server > (b) FIFOs for RT wakeups (this could use semaphores now) If this uses O

Re: noexec on /dev/shm

2010-12-23 Thread Lennart Poettering
On Mon, 20.12.10 17:26, Fernando Lopez-Lezcano (na...@ccrma.stanford.edu) wrote: > > In other words, these are setup costs, not maintenance costs. This may > > cause glitches in a realtime scenario to the extent that clients are > > created and destroyed, but in general I submit that the cost of

Re: noexec on /dev/shm

2010-12-23 Thread Lennart Poettering
On Mon, 20.12.10 13:07, Fernando Lopez-Lezcano (na...@ccrma.stanford.edu) wrote: > Jack (the Jack Audio Connection Kit, jackaudio.org) has been using the > file api (apologies if my wording is not absolutely correct in unix > terms) on the tmpfs filesystem that is mounted on /dev/shm for a very

Re: tmpfs != /dev/shm (was Re: noexec on /dev/shm)

2010-12-23 Thread Lennart Poettering
On Wed, 15.12.10 08:44, John Reiser (jrei...@bitwagon.com) wrote: > > I don't think there's a particularly good reason to use that filesystem for > > other uses. Just mount another tmpfs elsewhere. > > mount() requires CAP_SYS_ADMIN and therefore an application cannot rely > on performing mounts.

Re: noexec on /dev/shm

2010-12-23 Thread Lennart Poettering
be, > > "cleaner" > > could be the single most important thing to improve in the entire distro. > > The trouble is that we can't all agree on the immeasurable benefits (but > we can probably agree on the existence of the measurable costs), which > is why

Re: noexec on /dev/shm

2010-12-23 Thread Lennart Poettering
On Tue, 14.12.10 21:11, Nicholas Miell (nmi...@gmail.com) wrote: > On 12/14/2010 07:28 PM, Lennart Poettering wrote: > > In order to make things secure we minimize what is allowd on the various > > API file systems we mount. That includes that we set noexec and similar > > options for the file sys

Re: noexec on /dev/shm

2010-12-23 Thread Miloslav Trmač
drago01 píše v Čt 23. 12. 2010 v 18:26 +0100: > Well /tmp should be mounted tmpfs anyway (I have been doing this for > years and it is working just fine). > tmp isn't a persistent storage so it makes a lot of sense, and it is > *not* a dumping ground for giant files (apps that try to do that are >

Re: noexec on /dev/shm

2010-12-23 Thread drago01
On Tue, Dec 21, 2010 at 2:26 AM, Fernando Lopez-Lezcano wrote: > On 12/20/2010 02:17 PM, Adam Jackson wrote: >> On Mon, 2010-12-20 at 13:07 -0800, Fernando Lopez-Lezcano wrote: >> >>> I would like to bring to the attention of the list another current usage >>> of the tmpfs mounted on /dev/shm in F

Re: noexec on /dev/shm

2010-12-23 Thread Matt McCutchen
On Thu, 2010-12-23 at 09:11 -0800, Fernando Lopez-Lezcano wrote: > On 12/22/2010 12:56 PM, Casey Dahlin wrote: > > On Mon, Dec 20, 2010 at 07:16:21PM -0800, Fernando Lopez-Lezcano wrote: > >> (a) unix-domain sockets for non-RT communication with the server > > Perhaps these could become abstra

Re: noexec on /dev/shm

2010-12-23 Thread Fernando Lopez-Lezcano
On 12/22/2010 12:56 PM, Casey Dahlin wrote: > On Mon, Dec 20, 2010 at 07:16:21PM -0800, Fernando Lopez-Lezcano wrote: >> This is from Paul Davis, the main architect of Jack (I forwarded him >> your post): >> >> >> this isn't exactly correct. >> >> in /dev/shm on linux we have: >> >> (a) u

Re: noexec on /dev/shm

2010-12-22 Thread Casey Dahlin
On Mon, Dec 20, 2010 at 07:16:21PM -0800, Fernando Lopez-Lezcano wrote: > This is from Paul Davis, the main architect of Jack (I forwarded him > your post): > > > this isn't exactly correct. > > in /dev/shm on linux we have: > > (a) unix-domain sockets for non-RT communication with the

Re: noexec on /dev/shm

2010-12-20 Thread Fernando Lopez-Lezcano
On 12/20/2010 05:26 PM, Fernando Lopez-Lezcano wrote: > On 12/20/2010 02:17 PM, Adam Jackson wrote: >> On Mon, 2010-12-20 at 13:07 -0800, Fernando Lopez-Lezcano wrote: >> >>> I would like to bring to the attention of the list another current usage >>> of the tmpfs mounted on /dev/shm in Fedora pack

Re: noexec on /dev/shm

2010-12-20 Thread Fernando Lopez-Lezcano
On 12/20/2010 02:17 PM, Adam Jackson wrote: > On Mon, 2010-12-20 at 13:07 -0800, Fernando Lopez-Lezcano wrote: > >> I would like to bring to the attention of the list another current usage >> of the tmpfs mounted on /dev/shm in Fedora packages: >> >> Jack (the Jack Audio Connection Kit, jackaudio.o

Re: noexec on /dev/shm

2010-12-20 Thread Adam Jackson
On Mon, 2010-12-20 at 13:07 -0800, Fernando Lopez-Lezcano wrote: > I would like to bring to the attention of the list another current usage > of the tmpfs mounted on /dev/shm in Fedora packages: > > Jack (the Jack Audio Connection Kit, jackaudio.org) has been using the > file api (apologies if

Re: noexec on /dev/shm

2010-12-20 Thread Fernando Lopez-Lezcano
On 12/14/2010 09:37 PM, Lennart Poettering wrote: > On Sun, 12.12.10 19:49, John Reiser (jrei...@bitwagon.com) wrote: > >> The project is a database system that creates and dlopen()s >> plugins on-the-fly, for better performance on ["long-running"] queries. >> We like the speed of creat+write+close

Re: noexec on /dev/shm

2010-12-16 Thread Miloslav Trmač
Casey Dahlin píše v Čt 16. 12. 2010 v 15:50 -0500: > On Thu, Dec 16, 2010 at 08:16:53PM +0100, Miloslav Trmač wrote: > > Especially minor changes that don't bring any measurable benefit > > (perhaps making the system "cleaner" or making programmer's life more > > convenient) but require time from e

Re: noexec on /dev/shm

2010-12-16 Thread Casey Dahlin
On Thu, Dec 16, 2010 at 08:16:53PM +0100, Miloslav Trmač wrote: > Casey Dahlin píše v Čt 16. 12. 2010 v 11:19 -0500: > > On Thu, Dec 16, 2010 at 12:27:34PM +, Richard W.M. Jones wrote: > > > What you don't understand is that you are throwing away the experience > > > and knowledge of thousands

Re: noexec on /dev/shm

2010-12-16 Thread Matt McCutchen
On Thu, 2010-12-16 at 20:16 +0100, Miloslav Trmač wrote: > Casey Dahlin píše v Čt 16. 12. 2010 v 11:19 -0500: > > On Thu, Dec 16, 2010 at 12:27:34PM +, Richard W.M. Jones wrote: > > > What you don't understand is that you are throwing away the experience > > > and knowledge of thousands of Unix

Re: noexec on /dev/shm

2010-12-16 Thread Miloslav Trmač
Casey Dahlin píše v Čt 16. 12. 2010 v 11:19 -0500: > On Thu, Dec 16, 2010 at 12:27:34PM +, Richard W.M. Jones wrote: > > What you don't understand is that you are throwing away the experience > > and knowledge of thousands of Unix system administrators. Almost of > > all of them do not even re

Re: noexec on /dev/shm

2010-12-16 Thread Casey Dahlin
On Thu, Dec 16, 2010 at 12:27:34PM +, Richard W.M. Jones wrote: > On Wed, Dec 15, 2010 at 07:21:25AM +0100, Lennart Poettering wrote: > > Jeez. Tha's just FUD. Of course we have discussed this openly with > > various folks. We haven't discussed this with you, Rich, personally, but > > well, I'l

Re: noexec on /dev/shm

2010-12-16 Thread Matthew Miller
On Wed, Dec 15, 2010 at 07:17:21AM +0100, Lennart Poettering wrote: > systemd documentation is actually pretty good and mostly > comprehensive. Humble as I am I would even say that it is vastly > superior to the majority of all open source projects. If you want to > criticise us on something, pick

Re: noexec on /dev/shm

2010-12-16 Thread Richard W.M. Jones
On Wed, Dec 15, 2010 at 07:21:25AM +0100, Lennart Poettering wrote: > Jeez. Tha's just FUD. Of course we have discussed this openly with > various folks. We haven't discussed this with you, Rich, personally, but > well, I'll make a note now tht I'll DoS you now with every single > choice we make, t

Re: tmpfs != /dev/shm (was Re: noexec on /dev/shm)

2010-12-15 Thread John Reiser
On 12/15/2010 06:40 AM, Matthew Miller wrote: > On Tue, Dec 14, 2010 at 10:19:38PM -0800, John Reiser wrote: >> Also, the claim "The API for /dev/shm is shm_open()" is incorrect. >> See the other message for the history. When something is in the file >> system, then by default the file system APIs

tmpfs != /dev/shm (was Re: noexec on /dev/shm)

2010-12-15 Thread Matthew Miller
On Tue, Dec 14, 2010 at 10:19:38PM -0800, John Reiser wrote: > Also, the claim "The API for /dev/shm is shm_open()" is incorrect. > See the other message for the history. When something is in the file > system, then by default the file system APIs (including creat, open, > read, write, close, exec

Re: noexec on /dev/shm

2010-12-15 Thread Miloslav Trmač
Lennart Poettering píše v St 15. 12. 2010 v 06:59 +0100: > On Tue, 14.12.10 13:53, Miloslav Trmač (m...@volny.cz) wrote: > > > Changing the semantics of /etc/fstab without any consultation with > > fedora-devel or even notification of Fedora that something so > > long-standing is changing is hard

Re: noexec on /dev/shm

2010-12-15 Thread David Airlie
- "John Reiser" wrote: > On 12/14/2010 07:28 PM, Lennart Poettering wrote: > > > In order to make things secure we minimize what is allowd on the > various > > API file systems we mount. That includes that we set noexec and > similar > > options for the file systems involved. The interface

Re: noexec on /dev/shm

2010-12-14 Thread Lennart Poettering
On Tue, 14.12.10 22:19, John Reiser (jrei...@bitwagon.com) wrote: > Also, the claim "The API for /dev/shm is shm_open()" is incorrect. > See the other message for the history. When something is in the file > system, then by default the file system APIs (including creat, open, > read, write, close

Re: noexec on /dev/shm

2010-12-14 Thread Lennart Poettering
On Tue, 14.12.10 18:22, Miloslav Trmač (m...@volny.cz) wrote: > Bill Nottingham píše v Út 14. 12. 2010 v 12:08 -0500: > > > The problem is not the technical solution. Problem is that changes of > > > such important thing like /etc/fstab are decided without Fedora > > > developers. > > > > Eh, wh

Re: noexec on /dev/shm

2010-12-14 Thread Lennart Poettering
On Tue, 14.12.10 14:25, Richard W.M. Jones (rjo...@redhat.com) wrote: > > On Tue, Dec 14, 2010 at 02:24:53PM +0100, Tomasz Torcz wrote: > > We saw it includes /dev, /dev/shm etc. Is there any *reasonable* need > > to mount sysfs somewhere else than /sys. Or /dev with mode other than 755? > > T

Re: noexec on /dev/shm

2010-12-14 Thread John Reiser
On 12/14/2010 09:37 PM, Lennart Poettering wrote: > On Sun, 12.12.10 19:49, John Reiser (jrei...@bitwagon.com) wrote: > >> The project is a database system that creates and dlopen()s >> plugins on-the-fly, for better performance on ["long-running"] queries. >> We like the speed of creat+write+clos

Re: noexec on /dev/shm

2010-12-14 Thread Lennart Poettering
On Tue, 14.12.10 17:54, Paul Wouters (p...@xelerance.com) wrote: > On Tue, 14 Dec 2010, Tomasz Torcz wrote: > > > Of course administrator can temporary override: > > mount /dev/shm -o remount, nosuid > > > > Or even have it stick after reboot, by droping in /etc/systemd/system/ > > following uni

Re: noexec on /dev/shm

2010-12-14 Thread Lennart Poettering
On Tue, 14.12.10 08:08, Chris Adams (cmad...@hiwaay.net) wrote: > > Once upon a time, Tomasz Torcz said: > > We saw it includes /dev, /dev/shm etc. Is there any *reasonable* need > > to mount sysfs somewhere else than /sys. Or /dev with mode other than 755? > > Those all directories are mount

Re: noexec on /dev/shm

2010-12-14 Thread Lennart Poettering
On Tue, 14.12.10 13:53, Miloslav Trmač (m...@volny.cz) wrote: > Changing the semantics of /etc/fstab without any consultation with > fedora-devel or even notification of Fedora that something so > long-standing is changing is hardly constructive either. > > I can happily live with "systemd is a n

Re: noexec on /dev/shm

2010-12-14 Thread John Reiser
On 12/14/2010 07:28 PM, Lennart Poettering wrote: > In order to make things secure we minimize what is allowd on the various > API file systems we mount. That includes that we set noexec and similar > options for the file systems involved. The interface how to access > /dev/shm is called shm_open(

Re: noexec on /dev/shm

2010-12-14 Thread Lennart Poettering
On Sun, 12.12.10 19:49, John Reiser (jrei...@bitwagon.com) wrote: > The project is a database system that creates and dlopen()s > plugins on-the-fly, for better performance on ["long-running"] queries. > We like the speed of creat+write+close+open+read+mmap on /dev/shm. > If /dev/shm and /tmp both

Re: noexec on /dev/shm

2010-12-14 Thread Nicholas Miell
On 12/14/2010 07:28 PM, Lennart Poettering wrote: > In order to make things secure we minimize what is allowd on the various > API file systems we mount. That includes that we set noexec and similar > options for the file systems involved. The interface how to access > /dev/shm is called shm_open()

Re: noexec on /dev/shm

2010-12-14 Thread Garrett Holmstrom
On 12/14/2010 21:28, Lennart Poettering wrote: > On Tue, 14.12.10 12:08, Bill Nottingham (nott...@redhat.com) wrote: > > Thanks, Bill, for replying in so much detail. > > Here are a few other points: > >> - systemd mounts API filesystems without them needing to be in >>/etc/fstab. This is for a

Re: noexec on /dev/shm

2010-12-14 Thread Lennart Poettering
On Tue, 14.12.10 12:08, Bill Nottingham (nott...@redhat.com) wrote: Thanks, Bill, for replying in so much detail. Here are a few other points: > - systemd mounts API filesystems without them needing to be in > /etc/fstab. This is for a variety of reasons - having every system > installer hav

Re: noexec on /dev/shm

2010-12-14 Thread Adam Williamson
On Tue, 2010-12-14 at 17:54 -0500, Paul Wouters wrote: > On Tue, 14 Dec 2010, Tomasz Torcz wrote: > > > Of course administrator can temporary override: > > mount /dev/shm -o remount, nosuid > > > > Or even have it stick after reboot, by droping in /etc/systemd/system/ > > following unit definitio

Re: noexec on /dev/shm

2010-12-14 Thread Paul Wouters
On Tue, 14 Dec 2010, Bill Nottingham wrote: > It probably should be relnoted, sure. A relnote is not a substitute for proper documentation, logging and man pages. Paul -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel

Re: noexec on /dev/shm

2010-12-14 Thread Paul Wouters
On Tue, 14 Dec 2010, Tomasz Torcz wrote: > Of course administrator can temporary override: > mount /dev/shm -o remount, nosuid > > Or even have it stick after reboot, by droping in /etc/systemd/system/ > following unit definition¹: No. You either follow what is in /etc/fstab, or you disallow it

Re: noexec on /dev/shm

2010-12-14 Thread Tomasz Torcz
On Tue, Dec 14, 2010 at 02:25:38PM +, Richard W.M. Jones wrote: > On Tue, Dec 14, 2010 at 02:24:53PM +0100, Tomasz Torcz wrote: > > We saw it includes /dev, /dev/shm etc. Is there any *reasonable* need > > to mount sysfs somewhere else than /sys. Or /dev with mode other than 755? > > Those a

Re: noexec on /dev/shm

2010-12-14 Thread Adam Williamson
On Tue, 2010-12-14 at 13:48 -0500, Bill Nottingham wrote: > And again, listing things like /sys in fstab can just give the > uninitiated the idea that it's something they can change... it's *not* > a configuration setting. But I want to mount my /sys over nfs! What do you mean, it's not going to

Re: noexec on /dev/shm

2010-12-14 Thread Bill Nottingham
Miloslav Trmač (m...@volny.cz) said: > So the design was to > 1) change the setting in the C reimplementation The design was to pick a default... it's actually been that way since the initial implementation and that *is* the default on some other distributions. It probably should be relnoted, su

Re: noexec on /dev/shm

2010-12-14 Thread Bill Nottingham
Chris Adams (cmad...@hiwaay.net) said: > I've seen this said at least a couple of times. In what way is it > "wasteful"? On most systems, /etc/fstab is going to be less than one > filesystem block anyway, so there is absolutely zero "waste" going on. > > If "waste" of a few dozen bytes is now a

Re: noexec on /dev/shm

2010-12-14 Thread Miloslav Trmač
Jesse Keating píše v Út 14. 12. 2010 v 09:47 -0800: > On 12/14/10 9:22 AM, Miloslav Trmač wrote: > > Bill Nottingham píše v Út 14. 12. 2010 v 12:08 -0500: > >>> The problem is not the technical solution. Problem is that changes of > >>> such important thing like /etc/fstab are decided without Fedor

Re: noexec on /dev/shm

2010-12-14 Thread Chris Adams
Once upon a time, Bill Nottingham said: > having every system > installer have to write /proc, /sys, and so on is pretty wasteful. I've seen this said at least a couple of times. In what way is it "wasteful"? On most systems, /etc/fstab is going to be less than one filesystem block anyway,

Re: noexec on /dev/shm

2010-12-14 Thread Jesse Keating
On 12/14/10 9:22 AM, Miloslav Trmač wrote: > Bill Nottingham píše v Út 14. 12. 2010 v 12:08 -0500: >>> The problem is not the technical solution. Problem is that changes of >>> such important thing like /etc/fstab are decided without Fedora developers. >> >> Eh, what? It's a change to how API files

Re: noexec on /dev/shm

2010-12-14 Thread Miloslav Trmač
Bill Nottingham píše v Út 14. 12. 2010 v 12:08 -0500: > > The problem is not the technical solution. Problem is that changes of > > such important thing like /etc/fstab are decided without Fedora developers. > > Eh, what? It's a change to how API filesystems (/proc, /sys, etc.) get > mounted. When

Re: noexec on /dev/shm

2010-12-14 Thread Bill Nottingham
Marcela Mašláňová (mmasl...@redhat.com) said: > >>> That's not a very constructive wording. Filing a bug showing your use-case > >>> would be helpful. I'd like to restate this point. It's rather disappointing that so many people have decided to skip over this, and prefer to instead complain, insi

Re: noexec on /dev/shm

2010-12-14 Thread Matthew Miller
On Tue, Dec 14, 2010 at 02:25:38PM +, Richard W.M. Jones wrote: > I think it's very reasonable to want to edit /etc/fstab to change the > default mount options of these filesystems. Suppose that /dev/shm > defaults to allowing suid and exec. At some point in the future a > security problem is

Re: noexec on /dev/shm

2010-12-14 Thread Paul Wouters
On Tue, 14 Dec 2010, Tomasz Torcz wrote: > We saw it includes /dev, /dev/shm etc. Is there any *reasonable* need > to mount sysfs somewhere else than /sys. Or /dev with mode other than 755? > Those all directories are mounted _identically_ on every Linux distribution > down here. Why pollute fs

Re: noexec on /dev/shm

2010-12-14 Thread Richard W.M. Jones
On Tue, Dec 14, 2010 at 02:24:53PM +0100, Tomasz Torcz wrote: > We saw it includes /dev, /dev/shm etc. Is there any *reasonable* need > to mount sysfs somewhere else than /sys. Or /dev with mode other than 755? > Those all directories are mounted _identically_ on every Linux distribution > down

Re: noexec on /dev/shm

2010-12-14 Thread Miloslav Trmač
Marcela Mašláňová píše v Út 14. 12. 2010 v 14:55 +0100: > On 12/14/2010 02:24 PM, Tomasz Torcz wrote: > > On Tue, Dec 14, 2010 at 01:53:37PM +0100, Miloslav Trmač wrote: > >> Changing the semantics of /etc/fstab without any consultation with > >> fedora-devel or even notification of Fedora that som

Re: noexec on /dev/shm

2010-12-14 Thread Chris Adams
Once upon a time, Tomasz Torcz said: > We saw it includes /dev, /dev/shm etc. Is there any *reasonable* need > to mount sysfs somewhere else than /sys. Or /dev with mode other than 755? > Those all directories are mounted _identically_ on every Linux distribution > down here. Why pollute fstab

Re: noexec on /dev/shm

2010-12-14 Thread Marcela Mašláňová
On 12/14/2010 02:24 PM, Tomasz Torcz wrote: > On Tue, Dec 14, 2010 at 01:53:37PM +0100, Miloslav Trmač wrote: >> Matthew Miller píše v Út 14. 12. 2010 v 07:39 -0500: >>> On Mon, Dec 13, 2010 at 11:57:51PM +0100, Dominik 'Rathann' Mierzejewski >>> wrote: > the MS_NOEXEC flags is in private syst

Re: noexec on /dev/shm

2010-12-14 Thread Tomasz Torcz
On Tue, Dec 14, 2010 at 01:53:37PM +0100, Miloslav Trmač wrote: > Matthew Miller píše v Út 14. 12. 2010 v 07:39 -0500: > > On Mon, Dec 13, 2010 at 11:57:51PM +0100, Dominik 'Rathann' Mierzejewski > > wrote: > > > > the MS_NOEXEC flags is in private systemd fstab, see > > > > systemd/src/mount-setu

Re: Re: noexec on /dev/shm

2010-12-14 Thread dwayne
I will be away from 14 December 2010 to 7 January 2011. For Translate.org.za and ANLoc queries, please contact the office: +2712 460 1095 or info AT translate.org.za. -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel

Re: noexec on /dev/shm

2010-12-14 Thread Miloslav Trmač
Matthew Miller píše v Út 14. 12. 2010 v 07:39 -0500: > On Mon, Dec 13, 2010 at 11:57:51PM +0100, Dominik 'Rathann' Mierzejewski > wrote: > > > the MS_NOEXEC flags is in private systemd fstab, see > > > systemd/src/mount-setup.c: > > You're not kidding. Could the author of this code (I'm guessing..

Re: noexec on /dev/shm

2010-12-14 Thread Richard W.M. Jones
On Mon, Dec 13, 2010 at 09:47:49AM -0600, Garrett Holmstrom wrote: > If systemd is going to ignore fstab entries, could we please have the > fstab file on newly-installed systems replace the entries that would be > ignored with commentary that explains which filesystems will be ignored? > > That

Re: noexec on /dev/shm

2010-12-14 Thread Matthew Miller
On Mon, Dec 13, 2010 at 11:57:51PM +0100, Dominik 'Rathann' Mierzejewski wrote: > > the MS_NOEXEC flags is in private systemd fstab, see > > systemd/src/mount-setup.c: > You're not kidding. Could the author of this code (I'm guessing... > Lennart?) please explain this extremely bright idea of hard-

Re: noexec on /dev/shm

2010-12-13 Thread Dominik 'Rathann' Mierzejewski
Hi, On Monday, 13 December 2010 at 14:37, Karel Zak wrote: > On Sun, Dec 12, 2010 at 07:49:27PM -0800, John Reiser wrote: > > How did /dev/shm get noexec in Fedora 15 rawhide? > >$ grep /dev/shm /proc/mounts > >tmpfs /dev/shm tmpfs rw,seclabel,nosuid,nodev,noexec,relatime 0 0 > >$ grep

Re: noexec on /dev/shm

2010-12-13 Thread David Howells
Karel Zak wrote: > > As a site administrator, how can I change the default to omit 'noexec'? > > mount -o remount,exec ? That's not really changing the default. David -- devel mailing list devel@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/devel

Re: noexec on /dev/shm

2010-12-13 Thread Garrett Holmstrom
On 12/13/2010 7:37, Karel Zak wrote: > On Sun, Dec 12, 2010 at 07:49:27PM -0800, John Reiser wrote: >> How did /dev/shm get noexec in Fedora 15 rawhide? >> $ grep /dev/shm /proc/mounts >> tmpfs /dev/shm tmpfs rw,seclabel,nosuid,nodev,noexec,relatime 0 0 >> $ grep -srl noexec /etc >>

Re: noexec on /dev/shm

2010-12-13 Thread Karel Zak
On Sun, Dec 12, 2010 at 07:49:27PM -0800, John Reiser wrote: > How did /dev/shm get noexec in Fedora 15 rawhide? >$ grep /dev/shm /proc/mounts >tmpfs /dev/shm tmpfs rw,seclabel,nosuid,nodev,noexec,relatime 0 0 >$ grep -srl noexec /etc >/etc/alternatives/ld >/etc/fstab ## deriv

noexec on /dev/shm

2010-12-12 Thread John Reiser
How did /dev/shm get noexec in Fedora 15 rawhide? $ grep /dev/shm /proc/mounts tmpfs /dev/shm tmpfs rw,seclabel,nosuid,nodev,noexec,relatime 0 0 $ grep -srl noexec /etc /etc/alternatives/ld /etc/fstab ## derived from /proc/mounts /etc/mtab## derived from /proc/mounts This i