Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

trusted path execution #33

Closed
thestinger opened this issue May 17, 2017 · 7 comments
Closed

trusted path execution #33

thestinger opened this issue May 17, 2017 · 7 comments

Comments

@thestinger
Copy link
Member

thestinger commented May 17, 2017

This is a very low priority for linux-hardened since SELinux can be used to provide the same functionality and more.

@cormander
Copy link

Hey all. I'm the author of tpe-lkm and this was brought to my attention. I'm happy to contribute in some way. My first observation is the lack of hooking mmap and mprotect, see details in tpe issue 25.

@thestinger
Copy link
Member Author

@cormander There's no TPE implementation included here yet. In CopperheadOS, SELinux is used for this so it's among the features that I don't consider high priorities along with MPROTECT and many of the other miscellaneous features.

@thestinger
Copy link
Member Author

And I wouldn't really agree with this:

a volunteer's project trying to mainline most grsecurity features

Landing features upstream isn't my goal but rather a means to an end. It means not needing to maintain code out-of-tree and getting more input into the changes.

@cormander
Copy link

I suppose I was looking at the PR#32. Ping me if this ever gets considered. Thanks.

@thestinger
Copy link
Member Author

@cormander I'd like to include it in some form but I just haven't closely looked at it or thought about it much yet. The grsecurity restrict all option doesn't have a way to do exceptions but might be incompatible with how the app UID/GID model works on Android for some apps that check each other's signature / id and share code i.e. they act as a library. I'd want it to work for that case.

@cormander
Copy link

Not too long ago I coded in exceptions via xattr that can be set on files to work around that problem.

@thestinger
Copy link
Member Author

This isn't currently in-scope since SELinux can be used to provide the same protection and linux-hardened is intended to be used alongside SELinux or an equivalent rather than handling access control itself. There can be alternative options upstream as LSMs but it's not going to be done here.

@GrapheneOS GrapheneOS locked and limited conversation to collaborators Aug 15, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants