Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-15 Thread kbuild test robot
Hi Matt, [auto build test WARNING on security/next] [also build test WARNING on v4.12-rc5 next-20170615] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/commits/Matt-Brown/Add-Trusted-Path-Execution-as-a

Re: [kernel-hardening] Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-09 Thread Mimi Zohar
On Fri, 2017-06-09 at 09:18 -0400, Matt Brown wrote: > On 6/9/17 9:16 AM, Mimi Zohar wrote: > > On Fri, 2017-06-09 at 05:55 -0700, Kees Cook wrote: > >> On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar > >> wrote: > >>> On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote: > >> > >> * Issues: >

Re: [kernel-hardening] Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-09 Thread Matt Brown
On 6/9/17 9:16 AM, Mimi Zohar wrote: > On Fri, 2017-06-09 at 05:55 -0700, Kees Cook wrote: >> On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar wrote: >>> On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote: >> >> * Issues: >>* Can be bypassed by interpreted languages such as python. Yo

Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-09 Thread Mimi Zohar
On Fri, 2017-06-09 at 05:55 -0700, Kees Cook wrote: > On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar wrote: > > On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote: > >> >> > >> >> * Issues: > >> >>* Can be bypassed by interpreted languages such as python. You can > >> >> run > >> >> mali

Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-09 Thread Matt Brown
On 6/9/17 8:55 AM, Kees Cook wrote: > On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar wrote: >> On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote: > > * Issues: >* Can be bypassed by interpreted languages such as python. You can run > malicious code by doing: python -c 'ev

Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-09 Thread Kees Cook
On Fri, Jun 9, 2017 at 3:18 AM, Mimi Zohar wrote: > On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote: >> >> >> >> * Issues: >> >>* Can be bypassed by interpreted languages such as python. You can run >> >> malicious code by doing: python -c 'evil code' >> > >> > What's the recommend

Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-09 Thread Mimi Zohar
On Thu, 2017-06-08 at 23:50 -0400, Matt Brown wrote: > >> > >> *  Issues: > >>    *  Can be bypassed by interpreted languages such as python. You can run > >>   malicious code by doing: python -c 'evil code' > > > > What's the recommendation for people interested in using TPE but > > having int

Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-08 Thread Matt Brown
On 06/08/2017 10:38 PM, Kees Cook wrote: On Wed, Jun 7, 2017 at 8:43 PM, Matt Brown wrote: This patch was modified from Brad Spengler's Trusted Path Execution (TPE) feature. It also adds features and config options that were found in Corey Henderson's tpe-lkm project. Modifications from Brad S

Re: [PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-08 Thread Kees Cook
On Wed, Jun 7, 2017 at 8:43 PM, Matt Brown wrote: > This patch was modified from Brad Spengler's Trusted Path Execution (TPE) > feature. It also adds features and config options that were found in Corey > Henderson's tpe-lkm project. > > Modifications from Brad Spengler's implementation of TPE wer

[PATCH v2 1/1] Add Trusted Path Execution as a stackable LSM

2017-06-07 Thread Matt Brown
This patch was modified from Brad Spengler's Trusted Path Execution (TPE) feature. It also adds features and config options that were found in Corey Henderson's tpe-lkm project. Modifications from Brad Spengler's implementation of TPE were made to turn it into a stackable LSM using the existing LS