On 25.06.2008 08:07, Michael Stone wrote:
> We have an activity that wants superuser privilege in order to poke
> kernel memory.
>   

Hello? Please take the poor activity out back and shoot it. No activity
has any business poking kernel memory.

> The real questions we should be attempting to address here include:
>
> * Who is granting privilege to this activity?
>   

Everybody who wants to ridicule the security model.

> * How are they doing so?
>
> * How should we record the decision?
>
>      -  My tentative answer is that we should store activities with
>         different security properties in well-known directory chains
>         with appropriately restricted write access.
>
> * What kinds of abuse are these mechanisms vulnerable to?
>
> * Whose responsibility is it to handle the error condition that the
>   human operator does not, him-or-herself posess superuser privilege,
>   e.g. for theft-deterrence reasons?
>   

Just say no.

Having an activity poke kernel memory is a really strong sign that the
interface is totally broken.

Regards,
Carl-Daniel
_______________________________________________
Security mailing list
[email protected]
http://lists.laptop.org/listinfo/security

Reply via email to