On 2/13/24 7:36 AM, Jerry James wrote:
> On Mon, Feb 12, 2024 at 11:16 AM Marius Schwarz <fedora...@cloud-foo.de> 
> wrote:
>> In a german developer blog article was the topic raised, that with
>> uprobes enabled, userland apps can i.e. circumvent tls security(and
>> other protections),
>> by telling the kernel to probe the function calls with the uprobes api.
>> As this enables i.e. the hosting system of a vm or container, to track
>> activity inside the container, trust is lost i.e. from customer to
>> hoster. To be fair, you need to be root on the host to do this, but as
>> it "wasn't possible before", and it is "now" ( out in a greater public
>> ), it tends to create trust issues, just for being there*.
>>
>> As this only works with uprobes enabled and has no use case besides a
>> developer debugging apps, the question is:
>>
>> Do we need this for all others out there enabled by default?
> 
> Both systemtap and bpftrace can use uprobes.  Those capabilities have
> been important from time to time in my job.  That does not mean that
> my ability to do my job should outweigh security concerns, of course,
> but I think some effort should be made to find out if use of uprobes
> via systemtap and bpftrace is common amongst Fedora users.

"perf probe" can also define events based on uprobes, which makes them
available to "perf record", "perf trace", etc.
--
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to