grsecurity has one "feature" - if you enable sysctl support it starts up with most 
security features disabled. You must manually enable them using sysctl interface.

Mandrake 9.0 and above now enables sysctl support. Which means that most grsecurity 
features are actually off on default installation:

[bor@iap-pxy-mow1 bor]$ sudo sysctl -a | grep grsec
kernel.grsecurity.grsec_lock = 0
kernel.grsecurity.rand_bind = 0
kernel.grsecurity.cap_prot = 0
kernel.grsecurity.rand_rpc = 0
kernel.grsecurity.dmesg = 0
kernel.grsecurity.audit_mount = 0
kernel.grsecurity.altered_pings = 0
kernel.grsecurity.rand_tcp_src_ports = 0
kernel.grsecurity.rand_ip_ids = 0
kernel.grsecurity.rand_pids = 0
kernel.grsecurity.chroot_caps = 0
kernel.grsecurity.timechange_logging = 0
kernel.grsecurity.forkfail_logging = 0
kernel.grsecurity.signal_logging = 0
kernel.grsecurity.execve_limiting = 0
kernel.grsecurity.fifo_restrictions = 0
kernel.grsecurity.linking_restrictions = 0

this is BIG INCOMPATIBLE change comparing with previous versions. How many people 
installed secure kernel just to be fooled by its "security"?

I suggest adding a two line patch that removes check for sysctl and always makes 
grsecurity to come up with features enabled during compilation. This is much better 
than leaving users to do it manually (besides, in this case you always can disable 
them if needed). In case it is agreed patch will follow (do not have handy).

-andrey

P.S. I am not currently on cooker so I appreciate Cc in replies if any.

Reply via email to