Re: fexecve, round 3

2012-11-26 Thread Emmanuel Dreyfus
On Sun, Nov 25, 2012 at 10:58:01PM -0500, Thor Lancelot Simon wrote: Yes, I agree there is no security hazard introduced: if help from a process outside the chroot is assumed, there are already many ways to cirumvent chroot security. And I strongly disagree. We've discussed this at

Re: fexecve, round 3

2012-11-26 Thread Martin Husemann
Does anyone know of a setup that uses a process outside of a chroot doing descriptor passing to a chrooted process? I wonder if we should disallow that completely (i.e. fail the anxiliary data send if sender and recipient have different p_cwdi-cwdi_rdir)? Martin

Re: fexecve, round 3

2012-11-26 Thread Thor Lancelot Simon
On Mon, Nov 26, 2012 at 10:18:42AM +0100, Martin Husemann wrote: Does anyone know of a setup that uses a process outside of a chroot doing descriptor passing to a chrooted process? Yes. I mentioned some earlier in this discussion, before the thread jumps. I don't have time to write it up

Re: fexecve, round 3

2012-11-26 Thread David Young
On Mon, Nov 26, 2012 at 10:18:42AM +0100, Martin Husemann wrote: Does anyone know of a setup that uses a process outside of a chroot doing descriptor passing to a chrooted process? Yes. I can point to the same example as Thor has described, but I think that it is easy to cook up numerous

Re: fexecve, round 3

2012-11-25 Thread Thor Lancelot Simon
On Sat, Nov 24, 2012 at 06:53:16PM +0100, Emmanuel Dreyfus wrote: Let's try to move forward, and I will start will a sum up of what I understand from the standard. It would be nice if we could at least reach consensus on standard interpretation. I think your interpretation of the standard is

Re: fexecve, round 3

2012-11-25 Thread Christos Zoulas
In article 20121125152520.ga17...@panix.com, Thor Lancelot Simon t...@panix.com wrote: On Sat, Nov 24, 2012 at 06:53:16PM +0100, Emmanuel Dreyfus wrote: Let's try to move forward, and I will start will a sum up of what I understand from the standard. It would be nice if we could at least reach

Re: fexecve, round 3

2012-11-25 Thread Mouse
O_EXEC is mutually exclusive with O_RDONLY, O_WRONLY, or O_RDWR - simply don't include this poorly-designed functionality in NetBSD. Unless you want to change O_RDONLY to be non-zero and version all the syscalls that use it :-) I don't see any need to do that, unless they were crazy enough

Re: fexecve, round 3

2012-11-25 Thread David Laight
On Sun, Nov 25, 2012 at 07:54:59PM +, Christos Zoulas wrote: Does everyone agrees on this interpretation? If we do, next steps are - describe threats this introduce to chrooted processes Given a chrooted process would need a helping process outside the chroot (to pass it the fd), why is

Re: fexecve, round 3

2012-11-25 Thread Roland C. Dowdeswell
On Sun, Nov 25, 2012 at 11:47:14PM +, David Laight wrote: On Sun, Nov 25, 2012 at 07:54:59PM +, Christos Zoulas wrote: Does everyone agrees on this interpretation? If we do, next steps are - describe threats this introduce to chrooted processes Given a chrooted process would

Re: fexecve, round 3

2012-11-25 Thread Emmanuel Dreyfus
David Laight da...@l8s.co.uk wrote: Given a chrooted process would need a helping process outside the chroot (to pass it the fd), why is allowing the chrooted proccess to exec something any different from it arranging to get the helper to do it? Yes, I agree there is no security hazard

Re: fexecve, round 3

2012-11-25 Thread Thor Lancelot Simon
On Mon, Nov 26, 2012 at 03:22:42AM +0100, Emmanuel Dreyfus wrote: David Laight da...@l8s.co.uk wrote: Given a chrooted process would need a helping process outside the chroot (to pass it the fd), why is allowing the chrooted proccess to exec something any different from it arranging to